Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1565419
MD5:0c37b6b31773e922a0c8521a372fb1ea
SHA1:d57ca0a2d3012d3cba3d6093bb82ef2d6d454628
SHA256:0ee84b8643c4b64870ebbb47ac96d156b7144a15cf81b8524e9d36defcfa6451
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7460 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 0C37B6B31773E922A0C8521A372FB1EA)
    • taskkill.exe (PID: 7480 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7576 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7640 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7704 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7760 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 7824 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 7860 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 7876 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 8136 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73b48725-5781-491b-9a7d-e82bd29e0aa8} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225dd06e910 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7716 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4120 -parentBuildID 20230927232528 -prefsHandle 4200 -prefMapHandle 4128 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {65482933-8c7a-45cd-9793-b8ba64b693a1} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225ef150610 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 2200 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4832 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 4744 -prefsLen 31144 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b81adb2a-a0a3-424b-b324-c52fcaeb5a69} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225eddd2d10 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7460JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 34%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49741 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49746 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49765 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49763 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49762 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49764 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49775 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49774 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.1.91:443 -> 192.168.2.4:49778 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49779 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49780 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49815 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49813 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49814 version: TLS 1.2
    Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1828562163.00000225F7DC8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000D.00000003.1849406554.00000225F7D6C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1855397827.00000225F7D6B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000D.00000003.1849406554.00000225F7D6C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: npmproxy.pdbUGP source: firefox.exe, 0000000D.00000003.1855397827.00000225F7D6B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1847954204.00000225F7D01000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1828562163.00000225F7DC8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: npmproxy.pdb source: firefox.exe, 0000000D.00000003.1855397827.00000225F7D6B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1855397827.00000225F7D6B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1847954204.00000225F7D01000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F3DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F468EE FindFirstFileW,FindClose,0_2_00F468EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00F4698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F3D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F3D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F49642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F4979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00F49B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00F45C97
    Source: firefox.exeMemory has grown: Private usage: 1MB later: 223MB
    Source: unknownNetwork traffic detected: DNS query count 31
    Source: Joe Sandbox ViewIP Address: 151.101.1.91 151.101.1.91
    Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
    Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
    Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00F4CE44
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: firefox.exe, 0000000D.00000003.1927846277.00000225EB1C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: -l10n-id="newtab-menu-content-tooltip" data-l10n-args="{&quot;title&quot;:&quot;Wikipedia&quot;}" class="context-menu-button icon"></button></div><div class="topsite-impression-observer"></div></div></li><li class="top-site-outer"><div class="top-site-inner"><a class="top-site-button" href="https://www.reddit.com/" tabindex="0" draggable="true" data-is-sponsored-link="false"><div class="tile" aria-hidden="true"><div class="icon-wrapper" data-fallback="R"><div class="top-site-icon rich-icon" style="background-image:url(chrome://activity-stream/content/data/content/tippytop/images/reddit-com@2x.png)"></div></div></div><div class="title"><span dir="auto">Reddit<span class="sponsored-label" data-l10n-id="newtab-topsite-sponsored"></span></span></div></a><div><button aria-haspopup="true" data-l10n-id="newtab-menu-content-tooltip" data-l10n-args="{&quot;title&quot;:&quot;Reddit&quot;}" class="context-menu-button icon"></button></div><div class="topsite-impression-observer"></div></div></li><li class="top-site-outer hide-for-narrow"><div class="top-site-inner"><a class="top-site-button" href="https://twitter.com/" tabindex="0" draggable="true" data-is-sponsored-link="false"><div class="tile" aria-hidden="true"><div class="icon-wrapper" data-fallback="T"><div class="top-site-icon rich-icon" style="background-image:url(chrome://activity-stream/content/data/content/tippytop/images/twitter-com@2x.png)"></div></div></div><div class="title"><span dir="auto">Twitter<span class="sponsored-label" data-l10n-id="newtab-topsite-sponsored"></span></span></div></a><div><button aria-haspopup="true" data-l10n-id="newtab-menu-content-tooltip" data-l10n-args="{&quot;title&quot;:&quot;Twitter&quot;}" class="context-menu-button icon"></button></div><div class="topsite-impression-observer"></div></div></li><li class="top-site-outer placeholder hide-for-narrow"><div class="top-site-inner"><a class="top-site-button" tabindex="0" draggable="true" data-is-sponsored-link="false"><div class="tile" aria-hidden="true"><div class="icon-wrapper"><div class=""></div></div></div><div class="title"><span dir="auto"><br/><span class="sponsored-label" data-l10n-id="newtab-topsite-sponsored"></span></span></div></a><button aria-haspopup="dialog" class="context-menu-button edit-button icon" data-l10n-id="newtab-menu-topsites-placeholder-tooltip"></button><div class="topsite-impression-observer"></div></div></li></ul><div class="edit-topsites-wrapper"></div></div></section></div></div></div></div><style data-styles="[[null]]"></style></div><div class="discovery-stream ds-layout"><div class="ds-column ds-column-12"><div class="ds-column-grid"><div></div></div></div><style data-styles="[[null]]"></style></div></div></main></div></div> equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000D.00000003.1868539899.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913652844.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909061684.00000225F93AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1868539899.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913652844.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909061684.00000225F93AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://vk.com/,https://www.youtube.com/,https://ok.ru/,https://www.avito.ru/,https://www.aliexpress.com/,https://www.wikipedia.org/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://allegro.pl/,https://www.wikipedia.org/,https://www.olx.pl/,https://www.wykop.pl/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://allegro.pl/,https://www.wikipedia.org/,https://www.olx.pl/,https://www.wykop.pl/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.amazon.co.uk/,https://www.bbc.co.uk/,https://www.ebay.co.uk/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.amazon.co.uk/,https://www.bbc.co.uk/,https://www.ebay.co.uk/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/L equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/L equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/L equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174703000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174703000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174703000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1922763360.00000225F9395000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868539899.00000225F9384000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913652844.00000225F9395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://a581a2f1-688c-434b-8db8-16166b1993d9/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1948340576.00000225F02B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902977785.00000225F02B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830195519.00000225F7DA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1839965649.00000225EC84D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.comLMEM( equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1868539899.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913652844.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909061684.00000225F93AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com- equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1830195519.00000225F7DA2000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1829352198.00000225F7D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.youtube.comr equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
    Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
    Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: example.org
    Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
    Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.facebook.com
    Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
    Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
    Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
    Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
    Source: global trafficDNS traffic detected: DNS query: www.reddit.com
    Source: global trafficDNS traffic detected: DNS query: twitter.com
    Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
    Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1914944030.00000225F54AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947120957.00000225F54D3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
    Source: firefox.exe, 0000000D.00000003.1940124838.00000225F08AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.0/
    Source: firefox.exe, 0000000D.00000003.1940124838.00000225F08AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.1/
    Source: firefox.exe, 0000000D.00000003.1940124838.00000225F08AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.0/
    Source: firefox.exe, 0000000D.00000003.1940124838.00000225F08AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.1/
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: firefox.exe, 0000000D.00000003.1851157259.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848302491.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855397827.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849136129.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856631435.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849406554.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844833033.00000225F7DC5000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847392276.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
    Source: firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: firefox.exe, 0000000D.00000003.1851157259.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848302491.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855397827.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849136129.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856631435.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849406554.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847392276.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: firefox.exe, 0000000D.00000003.1832336937.00000225F7D9C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838702020.00000225F7DBE000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839478271.00000225F7DC1000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838992364.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840520538.00000225F7DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micr
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: firefox.exe, 0000000D.00000003.1851157259.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848302491.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855397827.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849136129.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856631435.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849406554.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844833033.00000225F7DC5000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847392276.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
    Source: firefox.exe, 0000000D.00000003.1851157259.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848302491.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855397827.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849136129.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856631435.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849406554.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847392276.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: firefox.exe, 0000000D.00000003.1844833033.00000225F7DC5000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
    Source: firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
    Source: firefox.exe, 0000000D.00000003.1868123604.00000225F9A92000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902977785.00000225F0263000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1935897716.00000225F7439000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909061684.00000225F9384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
    Source: firefox.exe, 0000000D.00000003.1942700636.00000225F0233000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944271037.00000225EF6CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923601465.00000225EF6AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
    Source: firefox.exe, 0000000D.00000003.1922763360.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
    Source: firefox.exe, 0000000D.00000003.1922763360.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-06/schema#
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-07/schema#-
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
    Source: firefox.exe, 0000000D.00000003.1947827299.00000225F4FD2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887111216.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917014378.00000225EF6AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891615462.00000225EE6AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892864498.00000225ECF9C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1906158799.00000225EF6CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1882879229.00000225F4E29000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916671577.00000225EF29B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815372927.00000225EE6B0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821039309.00000225EE631000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1943005331.00000225F021C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885721872.00000225EE647000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917341025.00000225EF238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945741356.00000225EE75A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927466543.00000225ED09F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816464560.00000225EE649000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1813301243.00000225ED9C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885721872.00000225EE630000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1939026379.00000225F4F09000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908260193.00000225ED954000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821039309.00000225EE6C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
    Source: firefox.exe, 0000000D.00000003.1851157259.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848302491.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855397827.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849136129.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856631435.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849406554.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844833033.00000225F7DC5000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847392276.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: firefox.exe, 0000000D.00000003.1851157259.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848302491.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855397827.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849136129.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856631435.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849406554.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847392276.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.thawte.com0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
    Source: firefox.exe, 0000000D.00000003.1851157259.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848302491.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855397827.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838702020.00000225F7DBE000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839478271.00000225F7DC1000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838992364.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849136129.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856631435.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849406554.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847392276.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840520538.00000225F7DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.cE&l
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://www.mozilla.com0
    Source: firefox.exe, 0000000D.00000003.1944310919.00000225EF623000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2005/app-updatex
    Source: firefox.exe, 0000000D.00000003.1940124838.00000225F08AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2006/browser/search/
    Source: firefox.exe, 0000000D.00000003.1927466543.00000225ED09F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868453186.00000225F93FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927583729.00000225ED061000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944486270.00000225EF4F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917115324.00000225EF27B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916368993.00000225EF4F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917386311.00000225EF21F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
    Source: firefox.exe, 00000010.00000002.2979475631.00000211753FD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1802253079.00000211753FD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1800853125.00000211753FD000.00000004.00000020.00020000.00000000.sdmp, mozilla-temp-41.13.drString found in binary or memory: http://www.videolan.org/x264.html
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
    Source: firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
    Source: firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
    Source: firefox.exe, 0000000D.00000003.1902977785.00000225F0230000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
    Source: firefox.exe, 0000000D.00000003.1936322419.00000225F5791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914566590.00000225F5782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
    Source: firefox.exe, 0000000D.00000003.1941130656.00000225F0504000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1952020153.00000225EE453000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
    Source: firefox.exe, 0000000D.00000003.1902161354.00000225F4F6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923500579.00000225F4F71000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915632937.00000225F4F6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1934087977.00000225F4F73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1890927206.00000225F94C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835469287.00000225F94C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835159706.00000225F94C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889176336.00000225F94C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909061684.00000225F9384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 0000000D.00000003.1927846277.00000225EB1E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/enhancer-for-youtube/
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/facebook-container/
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/to-google-translate/
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/wikipedia-context-menu-search/
    Source: firefox.exe, 0000000D.00000003.1917014378.00000225EF6AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1906158799.00000225EF6CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926117669.00000225EF6CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944271037.00000225EF6CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923601465.00000225EF6AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads-us.rd.linksynergy.com/as.php
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/a8bxj8j?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
    Source: firefox.exe, 0000000D.00000003.1933739217.00000225F50DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F50DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1933631415.00000225F50EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
    Source: firefox.exe, 0000000D.00000003.1914944030.00000225F54AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915556280.00000225F5026000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947662396.00000225F5028000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870255604.00000225F5015000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920326509.00000225EE2F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947120957.00000225F54D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
    Source: firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
    Source: firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE75A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
    Source: firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816573447.00000225EDABD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
    Source: firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816573447.00000225EDABD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
    Source: firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1813915766.00000225EE669000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
    Source: firefox.exe, 0000000D.00000003.1813915766.00000225EE669000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
    Source: firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816573447.00000225EDABD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
    Source: firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1813915766.00000225EE686000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816573447.00000225EDABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818762595.00000225EDA27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
    Source: firefox.exe, 0000000D.00000003.1813915766.00000225EE669000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1817617
    Source: firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1813915766.00000225EE686000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816573447.00000225EDABD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
    Source: firefox.exe, 0000000D.00000003.1813915766.00000225EE647000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=806991
    Source: firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1813915766.00000225EE686000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
    Source: firefox.exe, 0000000D.00000003.1813915766.00000225EE686000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=815437
    Source: firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
    Source: firefox.exe, 0000000D.00000003.1813915766.00000225EE686000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=951422
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
    Source: firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
    Source: firefox.exe, 0000000D.00000003.1925330783.00000225EE2CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920364766.00000225EE2CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1945741356.00000225EE742000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1812092562.00000225EE3AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE7F7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE742000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
    Source: firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
    Source: firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938681041.00000225F508E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1938486629.00000225F50A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1938486629.00000225F50A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
    Source: firefox.exe, 0000000D.00000003.1887111216.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885721872.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817101182.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821039309.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815372927.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899662639.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
    Source: firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1937413991.00000225F54FE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1911010276.00000225F54F6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886630229.00000225ED9B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
    Source: firefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
    Source: firefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
    Source: firefox.exe, 0000000D.00000003.1939695245.00000225F0DA9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174712000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1806070619.00000225EE612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
    Source: firefox.exe, 0000000D.00000003.1868883327.00000225F8172000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1946558343.00000225F8161000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913957379.00000225F815F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923146239.00000225F815F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868883327.00000225F815F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909616356.00000225F815F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1909444504.00000225F8172000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1923601465.00000225EF6AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913876260.00000225F91DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
    Source: firefox.exe, 0000000D.00000003.1939695245.00000225F0DA9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174712000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
    Source: firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
    Source: firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
    Source: firefox.exe, 00000010.00000002.2972904686.000002117472F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
    Source: firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
    Source: firefox.exe, 0000000D.00000003.1902161354.00000225F4FA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
    Source: firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
    Source: firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
    Source: firefox.exe, 0000000D.00000003.1868883327.00000225F8172000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909444504.00000225F8172000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
    Source: firefox.exe, 0000000D.00000003.1910044363.00000225F7CE2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1910414606.00000225F7C45000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869606175.00000225F7CE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
    Source: firefox.exe, 0000000D.00000003.1936322419.00000225F5791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914566590.00000225F5782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
    Source: firefox.exe, 0000000D.00000003.1925330783.00000225EE2CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920364766.00000225EE2CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
    Source: firefox.exe, 0000000D.00000003.1936322419.00000225F5791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914566590.00000225F5782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/H
    Source: firefox.exe, 0000000D.00000003.1936322419.00000225F5791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914566590.00000225F5782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/HCX
    Source: firefox.exe, 0000000D.00000003.1936322419.00000225F5791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914566590.00000225F5782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
    Source: firefox.exe, 0000000D.00000003.1936322419.00000225F5791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914566590.00000225F5782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947618380.00000225F5046000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
    Source: prefs-1.js.13.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
    Source: firefox.exe, 0000000D.00000003.1868539899.00000225F93AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915556280.00000225F5026000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947662396.00000225F5028000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870255604.00000225F5015000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1902977785.00000225F02A4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1948340576.00000225F02A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1941886268.00000225F02A4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/b588f206-0554-41c1-9b91-84791
    Source: firefox.exe, 0000000D.00000003.1909061684.00000225F9384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/metrics/1/e62ebd7e-7007-48c5-a658-1475
    Source: firefox.exe, 0000000D.00000003.1909061684.00000225F9384000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/newtab/1/d089a819-ff8f-4458-83d7-8f0e8
    Source: firefox.exe, 0000000D.00000003.1868481145.00000225F93EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/010d5698-8a25-48eb
    Source: firefox.exe, 0000000D.00000003.1868481145.00000225F93EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/565e5e5f-8c2f-4814
    Source: firefox.exe, 0000000D.00000003.1868481145.00000225F93EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/9135df6e-4ee7-4581
    Source: firefox.exe, 0000000D.00000003.1868481145.00000225F93EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/b897bf15-f5d2-40ef
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1937924763.00000225F52C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915324579.00000225F52BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema.
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema./
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/=
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
    Source: firefox.exe, 0000000D.00000003.1803162785.00000225EDEDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1803132252.00000225EDEE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
    Source: firefox.exe, 0000000D.00000003.1803132252.00000225EDEE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb7
    Source: firefox.exe, 0000000D.00000003.1902977785.00000225F0230000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798597949.00001CCB94480000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: firefox.exe, 0000000D.00000003.1798597949.00001CCB94480000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.comZ
    Source: firefox.exe, 0000000D.00000003.1902977785.00000225F0230000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905937260.00000225EF7B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
    Source: firefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
    Source: firefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
    Source: firefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
    Source: firefox.exe, 00000011.00000002.2974190359.0000022B40B87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1819071689.00000225EDA57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mochitest.youtube.com/
    Source: firefox.exe, 0000000D.00000003.1927846277.00000225EB1E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ok.ru/
    Source: firefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
    Source: firefox.exe, 0000000D.00000003.1819071689.00000225EDA57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.hbomax.com/page/
    Source: firefox.exe, 0000000D.00000003.1819071689.00000225EDA57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.hbomax.com/player/
    Source: firefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
    Source: firefox.exe, 0000000D.00000003.1914944030.00000225F5485000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947216707.00000225F5485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1927846277.00000225EB1E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com
    Source: firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
    Source: firefox.exe, 0000000D.00000003.1887111216.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885721872.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817101182.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821039309.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815372927.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899662639.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
    Source: firefox.exe, 0000000D.00000003.1902977785.00000225F027A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1902977785.00000225F027A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1902977785.00000225F027A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938486629.00000225F50A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
    Source: firefox.exe, 0000000D.00000003.1802660724.00000225EF3FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
    Source: firefox.exe, 0000000D.00000003.1925499388.00000225EDF35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174712000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
    Source: firefox.exe, 0000000D.00000003.1802660724.00000225EF3FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1935897716.00000225F7439000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747C2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
    Source: firefox.exe, 0000000D.00000003.1927846277.00000225EB1E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
    Source: firefox.exe, 0000000D.00000003.1925087602.00000225EE52F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1951311240.00000225EE52F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1937455785.00000225F540D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916589341.00000225EF3B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
    Source: firefox.exe, 0000000D.00000003.1945741356.00000225EE742000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868481145.00000225F93EE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1925955935.00000225F9323000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868802528.00000225F9323000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE742000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1933155691.00000225F9323000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1901627053.00000225F9323000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913838095.00000225F9323000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
    Source: firefox.exe, 0000000D.00000003.1942652817.00000225F024D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902977785.00000225F0244000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
    Source: firefox.exe, 0000000D.00000003.1927846277.00000225EB1E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://truecolors.firefox.com
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://vk.com/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
    Source: firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
    Source: firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
    Source: firefox.exe, 0000000D.00000003.1940253827.00000225F0881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
    Source: firefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
    Source: firefox.exe, 0000000D.00000003.1902977785.00000225F02B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
    Source: firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
    Source: firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915831618.00000225F059E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1940779627.00000225F05A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886630229.00000225ED9B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
    Source: firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ctrip.com/
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.co.uk/
    Source: firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
    Source: firefox.exe, 0000000D.00000003.1940253827.00000225F0881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902161354.00000225F4F3E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
    Source: firefox.exe, 0000000D.00000003.1800784497.00000225F550D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1800391554.00000225F5190000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
    Source: firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
    Source: firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886630229.00000225ED9B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
    Source: firefox.exe, 0000000D.00000003.1916368993.00000225EF4F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1819071689.00000225EDA57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hulu.com/watch/
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ifeng.com/
    Source: firefox.exe, 0000000D.00000003.1819071689.00000225EDA57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.instagram.com/
    Source: firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.iqiyi.com/
    Source: firefox.exe, 0000000D.00000003.1945252241.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mobilesuica.com/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
    Source: firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
    Source: firefox.exe, 0000000D.00000003.1806070619.00000225EE612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
    Source: firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918978948.00000225EE54D000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
    Source: firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/mobile/get-app/?utm_medium=firefox-desktop&utm_source=onboarding-mod
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
    Source: firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
    Source: firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 00000010.00000002.2972904686.00000211747C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/DL~t
    Source: firefox.exe, 0000000D.00000003.1938823682.00000225F5068000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
    Source: firefox.exe, 0000000D.00000003.1798597949.00001CCB94480000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
    Source: firefox.exe, 0000000D.00000003.1940253827.00000225F0881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
    Source: firefox.exe, 0000000D.00000003.1951147210.00000225EE575000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918978948.00000225EE575000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/
    Source: firefox.exe, 0000000D.00000003.1798597949.00001CCB94480000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tsn.cavtoolsZ
    Source: firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174703000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: firefox.exe, 0000000D.00000003.1940253827.00000225F0881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
    Source: firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798597949.00001CCB94480000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922763360.00000225F93AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
    Source: firefox.exe, 0000000D.00000003.1935897716.00000225F7439000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944817726.00000225EF165000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
    Source: recovery.jsonlz4.tmp.13.drString found in binary or memory: https://youtube.com/account?=
    Source: firefox.exe, 00000011.00000002.2973594102.0000022B40A60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig
    Source: firefox.exe, 0000000F.00000002.2974400377.000001EEFEDFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challeng
    Source: firefox.exe, 0000000D.00000003.1909061684.00000225F9384000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889176336.00000225F94AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974400377.000001EEFEDF0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2977749869.000001EEFF114000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974400377.000001EEFEDFA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2971794569.0000021174570000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2971794569.000002117457A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972189306.00000211745F4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2971890140.0000022B40620000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2971890140.0000022B4062A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2973594102.0000022B40A64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 0000000B.00000002.1741132687.0000024126970000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1758682273.000001F90B497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
    Source: firefox.exe, 0000000F.00000002.2974400377.000001EEFEDF0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2977749869.000001EEFF114000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2971794569.0000021174570000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972189306.00000211745F4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2971890140.0000022B40620000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2973594102.0000022B40A64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
    Source: firefox.exe, 00000010.00000002.2972189306.00000211745F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sigq
    Source: firefox.exe, 0000000D.00000003.1917150937.00000225EF271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com:(
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
    Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
    Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
    Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
    Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49741 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49746 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49765 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49763 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49762 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49764 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49775 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49774 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.1.91:443 -> 192.168.2.4:49778 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49779 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49780 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49815 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49813 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49814 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F4EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F4ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F4EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00F3AA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F69576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00F69576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_88e3e1d3-0
    Source: file.exe, 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_7e906c1f-0
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_34f13ab5-3
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e8f2fdaa-5
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000021175182377 NtQuerySystemInformation,16_2_0000021175182377
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000211751A9272 NtQuerySystemInformation,16_2_00000211751A9272
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00F3D5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F31201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00F3E8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED80600_2_00ED8060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F420460_2_00F42046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F382980_2_00F38298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0E4FF0_2_00F0E4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0676B0_2_00F0676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F648730_2_00F64873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EDCAF00_2_00EDCAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EFCAA00_2_00EFCAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EECC390_2_00EECC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F06DD90_2_00F06DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED91C00_2_00ED91C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EEB1190_2_00EEB119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF13940_2_00EF1394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF17060_2_00EF1706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF781B0_2_00EF781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF19B00_2_00EF19B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EE997D0_2_00EE997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED79200_2_00ED7920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF7A4A0_2_00EF7A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF7CA70_2_00EF7CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF1C770_2_00EF1C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F09EEE0_2_00F09EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F5BE440_2_00F5BE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF1F320_2_00EF1F32
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000002117518237716_2_0000021175182377
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000211751A927216_2_00000211751A9272
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000211751A999C16_2_00000211751A999C
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000211751A92B216_2_00000211751A92B2
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00EEF9F2 appears 31 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00EF0A30 appears 46 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@34/34@72/12
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F437B5 GetLastError,FormatMessageW,0_2_00F437B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F310BF AdjustTokenPrivileges,CloseHandle,0_2_00F310BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F316C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00F316C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F451CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00F451CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00F3D4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00F4648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00ED42A2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7648:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7768:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: firefox.exe, 0000000D.00000003.1868123604.00000225F9A67000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
    Source: firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
    Source: firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
    Source: firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;
    Source: firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;Fy6
    Source: firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;-
    Source: firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9'
    Source: firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9
    Source: firefox.exe, 0000000D.00000003.1939845094.00000225F0D8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
    Source: file.exeReversingLabs: Detection: 34%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
    Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73b48725-5781-491b-9a7d-e82bd29e0aa8} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225dd06e910 socket
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4120 -parentBuildID 20230927232528 -prefsHandle 4200 -prefMapHandle 4128 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {65482933-8c7a-45cd-9793-b8ba64b693a1} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225ef150610 rdd
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4832 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 4744 -prefsLen 31144 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b81adb2a-a0a3-424b-b324-c52fcaeb5a69} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225eddd2d10 utility
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73b48725-5781-491b-9a7d-e82bd29e0aa8} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225dd06e910 socketJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4120 -parentBuildID 20230927232528 -prefsHandle 4200 -prefMapHandle 4128 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {65482933-8c7a-45cd-9793-b8ba64b693a1} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225ef150610 rddJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4832 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 4744 -prefsLen 31144 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b81adb2a-a0a3-424b-b324-c52fcaeb5a69} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225eddd2d10 utilityJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1828562163.00000225F7DC8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000D.00000003.1849406554.00000225F7D6C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1855397827.00000225F7D6B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000D.00000003.1849406554.00000225F7D6C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: npmproxy.pdbUGP source: firefox.exe, 0000000D.00000003.1855397827.00000225F7D6B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1847954204.00000225F7D01000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1828562163.00000225F7DC8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: npmproxy.pdb source: firefox.exe, 0000000D.00000003.1855397827.00000225F7D6B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1855397827.00000225F7D6B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1847954204.00000225F7D01000.00000004.00000020.00020000.00000000.sdmp
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED42DE
    Source: gmpopenh264.dll.tmp.13.drStatic PE information: section name: .rodata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF0A76 push ecx; ret 0_2_00EF0A89
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EEF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00EEF98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F61C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00F61C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95913
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000021175182377 rdtsc 16_2_0000021175182377
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.6 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F3DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F468EE FindFirstFileW,FindClose,0_2_00F468EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00F4698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F3D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F3D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F49642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F4979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00F49B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00F45C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED42DE
    Source: firefox.exe, 00000010.00000002.2971794569.000002117457A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@`
    Source: firefox.exe, 00000010.00000002.2976549637.0000021174CF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
    Source: firefox.exe, 0000000F.00000002.2979285630.000001EEFF300000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWR
    Source: firefox.exe, 0000000F.00000002.2974400377.000001EEFEDFA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2972810101.0000022B406C0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2971890140.0000022B4062A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: firefox.exe, 0000000F.00000002.2978394054.000001EEFF216000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
    Source: firefox.exe, 00000010.00000002.2976549637.0000021174CF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW,
    Source: firefox.exe, 0000000F.00000002.2979285630.000001EEFF300000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
    Source: firefox.exe, 0000000F.00000002.2979285630.000001EEFF300000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllb
    Source: firefox.exe, 0000000F.00000002.2979285630.000001EEFF300000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2976549637.0000021174CF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_0000021175182377 rdtsc 16_2_0000021175182377
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4EAA2 BlockInput,0_2_00F4EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F02622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED42DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF4CE8 mov eax, dword ptr fs:[00000030h]0_2_00EF4CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00F30B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F02622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EF083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF09D5 SetUnhandledExceptionFilter,0_2_00EF09D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00EF0C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F31201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F12BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F12BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3B226 SendInput,keybd_event,0_2_00F3B226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F522DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00F522DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00F30B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F31663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00F31663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: firefox.exe, 0000000D.00000003.1842216210.00000225F7DC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hSoftware\Policies\Microsoft\Windows\PersonalizationNoChangingStartMenuBackgroundPersonalColors_BackgroundWilStaging_02RtlDisownModuleHeapAllocationRtlQueryFeatureConfigurationRtlRegisterFeatureConfigurationChangeNotificationRtlSubscribeWnfStateChangeNotificationRtlDllShutdownInProgressntdll.dllNtQueryWnfStateDataLocal\SM0:%d:%d:%hs_p0Local\SessionImmersiveColorPreferenceBEGINTHMthmfile\Sessions\%d\Windows\ThemeSectionMessageWindowendthemewndThemeApiConnectionRequest\ThemeApiPortwinsta0SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\PersonalizeAppsUseLightThemeSystemUsesLightThemedefaultshell\themes\uxtheme\render.cppCompositedWindow::WindowdeletedrcacheMDIClientSoftware\Microsoft\Windows\DWMColorPrevalenceSoftware\Microsoft\Windows\CurrentVersion\ImmersiveShellTabletModeMENUAccentColorSoftware\Microsoft\Windows\CurrentVersion\Explorer\AccentDefaultStartColorControl Panel\DesktopAutoColorizationAccentColorMenuStartColorMenuAutoColorSoftware\Microsoft\Windows\CurrentVersion\Themes\History\ColorsSoftware\Microsoft\Windows\CurrentVersion\Themes\HistoryAccentPaletteTab$Shell_TrayWndLocal\SessionImmersiveColorMutex
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF0698 cpuid 0_2_00EF0698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F48195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00F48195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F2D27A GetUserNameW,0_2_00F2D27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F0BB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED42DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7460, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7460, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F51204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00F51204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F51806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00F51806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    12
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    2
    Obfuscated Files or Information
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
    Valid Accounts
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
    Access Token Manipulation
    1
    Extra Window Memory Injection
    LSA Secrets131
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Process Injection
    1
    Masquerading
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Valid Accounts
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Virtualization/Sandbox Evasion
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
    Access Token Manipulation
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1565419 Sample: file.exe Startdate: 29/11/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 34 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of sandbox detection 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 231 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 youtube.com 142.250.181.142, 443, 49738, 49739 GOOGLEUS United States 19->51 53 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49740, 49747, 49751 GOOGLEUS United States 19->53 55 11 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe34%ReversingLabsWin32.Trojan.AutoitInject
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://youtube.com:(0%Avira URL Cloudsafe
    https://www.tsn.cavtoolsZ0%Avira URL Cloudsafe
    http://www.microsoft.cE&l0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    example.org
    93.184.215.14
    truefalse
      high
      star-mini.c10r.facebook.com
      157.240.196.35
      truefalse
        high
        prod.classify-client.prod.webservices.mozgcp.net
        35.190.72.216
        truefalse
          high
          prod.balrog.prod.cloudops.mozgcp.net
          35.244.181.201
          truefalse
            high
            twitter.com
            104.244.42.193
            truefalse
              high
              prod.detectportal.prod.cloudops.mozgcp.net
              34.107.221.82
              truefalse
                high
                services.addons.mozilla.org
                151.101.1.91
                truefalse
                  high
                  dyna.wikimedia.org
                  185.15.58.224
                  truefalse
                    high
                    prod.remote-settings.prod.webservices.mozgcp.net
                    34.149.100.209
                    truefalse
                      high
                      contile.services.mozilla.com
                      34.117.188.166
                      truefalse
                        high
                        youtube.com
                        142.250.181.142
                        truefalse
                          high
                          prod.content-signature-chains.prod.webservices.mozgcp.net
                          34.160.144.191
                          truefalse
                            high
                            youtube-ui.l.google.com
                            172.217.19.238
                            truefalse
                              high
                              reddit.map.fastly.net
                              151.101.193.140
                              truefalse
                                high
                                us-west1.prod.sumo.prod.webservices.mozgcp.net
                                34.149.128.2
                                truefalse
                                  high
                                  ipv4only.arpa
                                  192.0.0.170
                                  truefalse
                                    high
                                    prod.ads.prod.webservices.mozgcp.net
                                    34.117.188.166
                                    truefalse
                                      high
                                      push.services.mozilla.com
                                      34.107.243.93
                                      truefalse
                                        high
                                        normandy-cdn.services.mozilla.com
                                        35.201.103.21
                                        truefalse
                                          high
                                          telemetry-incoming.r53-2.services.mozilla.com
                                          34.120.208.123
                                          truefalse
                                            high
                                            www.reddit.com
                                            unknown
                                            unknownfalse
                                              high
                                              spocs.getpocket.com
                                              unknown
                                              unknownfalse
                                                high
                                                content-signature-2.cdn.mozilla.net
                                                unknown
                                                unknownfalse
                                                  high
                                                  support.mozilla.org
                                                  unknown
                                                  unknownfalse
                                                    high
                                                    firefox.settings.services.mozilla.com
                                                    unknown
                                                    unknownfalse
                                                      high
                                                      www.youtube.com
                                                      unknown
                                                      unknownfalse
                                                        high
                                                        www.facebook.com
                                                        unknown
                                                        unknownfalse
                                                          high
                                                          detectportal.firefox.com
                                                          unknown
                                                          unknownfalse
                                                            high
                                                            normandy.cdn.mozilla.net
                                                            unknown
                                                            unknownfalse
                                                              high
                                                              shavar.services.mozilla.com
                                                              unknown
                                                              unknownfalse
                                                                high
                                                                www.wikipedia.org
                                                                unknown
                                                                unknownfalse
                                                                  high
                                                                  NameSourceMaliciousAntivirus DetectionReputation
                                                                  https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                    high
                                                                    https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.mozilla.com0gmpopenh264.dll.tmp.13.drfalse
                                                                          high
                                                                          https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                            high
                                                                            https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000011.00000002.2974190359.0000022B40B87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://json-schema.org/draft/2019-09/schema.firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://spocs.getpocket.com/spocsfirefox.exe, 0000000D.00000003.1802660724.00000225EF3FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://screenshots.firefox.comfirefox.exe, 0000000D.00000003.1927846277.00000225EB1E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://shavar.services.mozilla.comfirefox.exe, 0000000D.00000003.1902977785.00000225F027A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://completion.amazon.com/search/complete?q=firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://identity.mozilla.com/ids/ecosystem_telemetryUfirefox.exe, 0000000D.00000003.1936322419.00000225F5791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914566590.00000225F5782000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://monitor.firefox.com/breach-details/firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915831618.00000225F059E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1940779627.00000225F05A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886630229.00000225ED9B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://www.msn.comfirefox.exe, 0000000D.00000003.1798597949.00001CCB94480000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://youtube.com/firefox.exe, 0000000D.00000003.1935897716.00000225F7439000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944817726.00000225EF165000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://content-signature-2.cdn.mozilla.net/firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://json-schema.org/draft/2020-12/schema/=firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94firefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                                          high
                                                                                                                          https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=htfirefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://www.instagram.com/firefox.exe, 0000000D.00000003.1819071689.00000225EDA57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://api.accounts.firefox.com/v1firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://ok.ru/firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://www.amazon.com/firefox.exe, 0000000D.00000003.1902977785.00000225F02B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafirefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                                                            high
                                                                                                                                            http://ocsp.rootca1.amazontrust.com0:firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://www.youtube.com/firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174703000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816573447.00000225EDABD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://addons.mozilla.org/firefox/addon/to-google-translate/firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        http://127.0.0.1:firefox.exe, 0000000D.00000003.1914944030.00000225F54AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947120957.00000225F54D3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 0000000D.00000003.1813915766.00000225EE669000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152firefox.exe, 0000000D.00000003.1887111216.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885721872.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1817101182.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821039309.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815372927.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899662639.00000225EE6BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://bugzilla.mofirefox.exe, 0000000D.00000003.1917676768.00000225EE75A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                https://mitmdetection.services.mozilla.com/firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://youtube.com:(firefox.exe, 0000000D.00000003.1917150937.00000225EF271000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                  • Avira URL Cloud: safe
                                                                                                                                                                  unknown
                                                                                                                                                                  https://youtube.com/account?=recovery.jsonlz4.tmp.13.drfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://shavar.services.mozilla.com/firefox.exe, 0000000D.00000003.1902977785.00000225F027A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      https://spocs.getpocket.com/firefox.exe, 0000000D.00000003.1925499388.00000225EDF35000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.0000021174712000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40B13000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://www.tsn.cavtoolsZfirefox.exe, 0000000D.00000003.1798597949.00001CCB94480000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                              • Avira URL Cloud: safe
                                                                                                                                                                              unknown
                                                                                                                                                                              https://www.iqiyi.com/firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                high
                                                                                                                                                                                https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      http://a9.com/-/spec/opensearch/1.0/firefox.exe, 0000000D.00000003.1940124838.00000225F08AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          https://monitor.firefox.com/user/dashboardfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                            high
                                                                                                                                                                                            https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                              high
                                                                                                                                                                                              https://monitor.firefox.com/aboutfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                http://mozilla.org/MPL/2.0/.firefox.exe, 0000000D.00000003.1947827299.00000225F4FD2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1887111216.00000225EE6B7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917014378.00000225EF6AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891615462.00000225EE6AD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892864498.00000225ECF9C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1906158799.00000225EF6CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1882879229.00000225F4E29000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916671577.00000225EF29B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815372927.00000225EE6B0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821039309.00000225EE631000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1943005331.00000225F021C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885721872.00000225EE647000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917341025.00000225EF238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945741356.00000225EE75A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927466543.00000225ED09F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816464560.00000225EE649000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1813301243.00000225ED9C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885721872.00000225EE630000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1939026379.00000225F4F09000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908260193.00000225ED954000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821039309.00000225EE6C7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  https://account.bellmedia.cfirefox.exe, 0000000D.00000003.1902977785.00000225F0230000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    high
                                                                                                                                                                                                    https://login.microsoftonline.comfirefox.exe, 0000000D.00000003.1902977785.00000225F0230000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905937260.00000225EF7B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                      high
                                                                                                                                                                                                      https://coverage.mozilla.orgfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.13.drfalse
                                                                                                                                                                                                          high
                                                                                                                                                                                                          https://www.zhihu.com/firefox.exe, 0000000D.00000003.1940253827.00000225F0881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                            high
                                                                                                                                                                                                            http://x1.c.lencr.org/0firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                              high
                                                                                                                                                                                                              http://x1.i.lencr.org/0firefox.exe, 0000000D.00000003.1920489328.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1802691277.00000225EDFCF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                high
                                                                                                                                                                                                                http://a9.com/-/spec/opensearch/1.1/firefox.exe, 0000000D.00000003.1940124838.00000225F08AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                  high
                                                                                                                                                                                                                  https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 0000000D.00000003.1882879229.00000225F4E57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884243388.00000225F4E5E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                    high
                                                                                                                                                                                                                    https://blocked.cdn.mozilla.net/firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                      high
                                                                                                                                                                                                                      https://json-schema.org/draft/2019-09/schemafirefox.exe, 0000000D.00000003.1937924763.00000225F52C1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915324579.00000225F52BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                        high
                                                                                                                                                                                                                        https://profiler.firefox.comfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                          high
                                                                                                                                                                                                                          https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                            high
                                                                                                                                                                                                                            http://crl.micrfirefox.exe, 0000000D.00000003.1832336937.00000225F7D9C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838702020.00000225F7DBE000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839478271.00000225F7DC1000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838992364.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840520538.00000225F7DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                              high
                                                                                                                                                                                                                              https://identity.mozilla.com/apps/relayfirefox.exe, 0000000D.00000003.1925330783.00000225EE2CD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920364766.00000225EE2CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                high
                                                                                                                                                                                                                                https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                  high
                                                                                                                                                                                                                                  https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000D.00000003.1942652817.00000225F024D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902977785.00000225F0244000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                    high
                                                                                                                                                                                                                                    https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 0000000D.00000003.1818762595.00000225EDA17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1813915766.00000225EE686000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816573447.00000225EDABD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818762595.00000225EDA27000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                      high
                                                                                                                                                                                                                                      https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 0000000D.00000003.1768512564.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768314963.00000225EC51F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767741685.00000225EC533000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927846277.00000225EB1BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                        high
                                                                                                                                                                                                                                        https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/firefox.exe, 0000000D.00000003.1925832607.00000225EDEB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                          high
                                                                                                                                                                                                                                          https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfirefox.exe, 0000000F.00000002.2974906727.000001EEFF0C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2972904686.00000211747E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2974190359.0000022B40BC8000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                                                                                                                                                            high
                                                                                                                                                                                                                                            https://contile.services.mozilla.com/v1/tilesfirefox.exe, 0000000D.00000003.1938486629.00000225F50A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                              high
                                                                                                                                                                                                                                              https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/firefox.exe, 0000000D.00000003.1923601465.00000225EF6AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913876260.00000225F91DF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                high
                                                                                                                                                                                                                                                https://monitor.firefox.com/user/preferencesfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                  high
                                                                                                                                                                                                                                                  https://screenshots.firefox.com/firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                    high
                                                                                                                                                                                                                                                    https://www.google.com/searchfirefox.exe, 0000000D.00000003.1765776200.00000225ECC40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765894265.00000225ECC60000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765649586.00000225ECC21000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766028117.00000225ECC7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765508142.00000225ECA00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886630229.00000225ED9B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917676768.00000225EE7ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                      high
                                                                                                                                                                                                                                                      https://relay.firefox.com/api/v1/firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                        high
                                                                                                                                                                                                                                                        http://json-schema.org/draft-07/schema#-firefox.exe, 0000000D.00000003.1917676768.00000225EE766000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945252241.00000225EE769000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926451454.00000225EE767000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                          high
                                                                                                                                                                                                                                                          https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-reportfirefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                            high
                                                                                                                                                                                                                                                            https://topsites.services.mozilla.com/cid/firefox.exe, 0000000F.00000002.2974191652.000001EEFED80000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2977337097.0000021174DF0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2973376733.0000022B40900000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                              high
                                                                                                                                                                                                                                                              https://twitter.com/firefox.exe, 0000000D.00000003.1869774807.00000225F5045000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914944030.00000225F545E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                high
                                                                                                                                                                                                                                                                https://vk.com/firefox.exe, 0000000D.00000003.1945198465.00000225EF085000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                  high
                                                                                                                                                                                                                                                                  https://www.olx.pl/firefox.exe, 0000000D.00000003.1940253827.00000225F0881000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902619343.00000225F0841000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                    high
                                                                                                                                                                                                                                                                    http://www.microsoft.cE&lfirefox.exe, 0000000D.00000003.1851157259.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848302491.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855397827.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845274729.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838702020.00000225F7DBE000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839478271.00000225F7DC1000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838992364.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846504839.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849136129.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856631435.00000225F7DC0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849406554.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842336256.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843237220.00000225F7DBD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1847392276.00000225F7DBC000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840520538.00000225F7DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                    • Avira URL Cloud: safe
                                                                                                                                                                                                                                                                    unknown
                                                                                                                                                                                                                                                                    • No. of IPs < 25%
                                                                                                                                                                                                                                                                    • 25% < No. of IPs < 50%
                                                                                                                                                                                                                                                                    • 50% < No. of IPs < 75%
                                                                                                                                                                                                                                                                    • 75% < No. of IPs
                                                                                                                                                                                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                                                                                    151.101.1.91
                                                                                                                                                                                                                                                                    services.addons.mozilla.orgUnited States
                                                                                                                                                                                                                                                                    54113FASTLYUSfalse
                                                                                                                                                                                                                                                                    142.250.181.142
                                                                                                                                                                                                                                                                    youtube.comUnited States
                                                                                                                                                                                                                                                                    15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                    34.149.100.209
                                                                                                                                                                                                                                                                    prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                    2686ATGS-MMD-ASUSfalse
                                                                                                                                                                                                                                                                    34.107.243.93
                                                                                                                                                                                                                                                                    push.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                    15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                    34.107.221.82
                                                                                                                                                                                                                                                                    prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                                                                                                                                                                    15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                    35.244.181.201
                                                                                                                                                                                                                                                                    prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                                                                                                                                                                    15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                    34.117.188.166
                                                                                                                                                                                                                                                                    contile.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                                                                                                                                                                    35.201.103.21
                                                                                                                                                                                                                                                                    normandy-cdn.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                    15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                    35.190.72.216
                                                                                                                                                                                                                                                                    prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                    15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                    34.160.144.191
                                                                                                                                                                                                                                                                    prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                    2686ATGS-MMD-ASUSfalse
                                                                                                                                                                                                                                                                    34.120.208.123
                                                                                                                                                                                                                                                                    telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                    15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                    IP
                                                                                                                                                                                                                                                                    127.0.0.1
                                                                                                                                                                                                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                                                                                                    Analysis ID:1565419
                                                                                                                                                                                                                                                                    Start date and time:2024-11-29 19:48:08 +01:00
                                                                                                                                                                                                                                                                    Joe Sandbox product:CloudBasic
                                                                                                                                                                                                                                                                    Overall analysis duration:0h 7m 1s
                                                                                                                                                                                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                                                                                                                                                                                    Report type:full
                                                                                                                                                                                                                                                                    Cookbook file name:default.jbs
                                                                                                                                                                                                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                                                                                    Number of analysed new started processes analysed:22
                                                                                                                                                                                                                                                                    Number of new started drivers analysed:0
                                                                                                                                                                                                                                                                    Number of existing processes analysed:0
                                                                                                                                                                                                                                                                    Number of existing drivers analysed:0
                                                                                                                                                                                                                                                                    Number of injected processes analysed:0
                                                                                                                                                                                                                                                                    Technologies:
                                                                                                                                                                                                                                                                    • HCA enabled
                                                                                                                                                                                                                                                                    • EGA enabled
                                                                                                                                                                                                                                                                    • AMSI enabled
                                                                                                                                                                                                                                                                    Analysis Mode:default
                                                                                                                                                                                                                                                                    Analysis stop reason:Timeout
                                                                                                                                                                                                                                                                    Sample name:file.exe
                                                                                                                                                                                                                                                                    Detection:MAL
                                                                                                                                                                                                                                                                    Classification:mal72.troj.evad.winEXE@34/34@72/12
                                                                                                                                                                                                                                                                    EGA Information:
                                                                                                                                                                                                                                                                    • Successful, ratio: 50%
                                                                                                                                                                                                                                                                    HCA Information:
                                                                                                                                                                                                                                                                    • Successful, ratio: 94%
                                                                                                                                                                                                                                                                    • Number of executed functions: 40
                                                                                                                                                                                                                                                                    • Number of non-executed functions: 311
                                                                                                                                                                                                                                                                    Cookbook Comments:
                                                                                                                                                                                                                                                                    • Found application associated with file extension: .exe
                                                                                                                                                                                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                                                                                                                                                                    • Excluded IPs from analysis (whitelisted): 52.32.237.164, 52.27.142.243, 34.209.229.249, 172.217.17.42, 172.217.17.74, 172.217.17.46, 88.221.134.209, 88.221.134.155
                                                                                                                                                                                                                                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, shavar.prod.mozaws.net, ciscobinary.openh264.org, slscr.update.microsoft.com, otelrules.azureedge.net, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, safebrowsing.googleapis.com, location.services.mozilla.com
                                                                                                                                                                                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                                                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                                                                                                                    • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                                                                                                                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                                                                                                                                                                    • VT rate limit hit for: file.exe
                                                                                                                                                                                                                                                                    TimeTypeDescription
                                                                                                                                                                                                                                                                    13:49:11API Interceptor1x Sleep call for process: firefox.exe modified
                                                                                                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                    34.117.188.166file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                        151.101.1.91file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                            34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                example.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.195.35
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 157.240.196.35
                                                                                                                                                                                                                                                                                                                                twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.1
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.129
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.129
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.129
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.193
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.193
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.65
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.1
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.1
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 104.244.42.1
                                                                                                                                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                FASTLYUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 151.101.193.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 151.101.193.91
                                                                                                                                                                                                                                                                                                                                weWHT1b7JO.dllGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                • 185.199.111.133
                                                                                                                                                                                                                                                                                                                                phish_alert_iocp_v1.4.48 (80).emlGet hashmaliciousInvoiceScamBrowse
                                                                                                                                                                                                                                                                                                                                • 199.232.210.172
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                https://mobile.mail.yahoo.com/apps/affiliateRouter?brandUrl=https://www.google.com/amp/t.co/N0QLoca1EY&appName=YMailNorrin&partner=1&locale=1&pageId=commerce_intent&clickRef=message_header&region=us&annotation=&buckets=&segment=&interactedItem=&slot=&uuid=mailNAGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                • 151.101.66.137
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, LummaC StealerBrowse
                                                                                                                                                                                                                                                                                                                                • 185.199.109.133
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousAmadey, AsyncRAT, Cryptbot, DcRat, LummaC Stealer, Nymaim, StealcBrowse
                                                                                                                                                                                                                                                                                                                                • 185.199.111.133
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousStealeriumBrowse
                                                                                                                                                                                                                                                                                                                                • 185.199.110.133
                                                                                                                                                                                                                                                                                                                                GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                                                                                                                                                                                                                                                                                • 34.118.84.150
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                i686.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                • 34.64.81.230
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                                                                                                                                                                                                                                                                                • 34.118.84.150
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousAmadey, AsyncRAT, Cryptbot, DcRat, LummaC Stealer, Nymaim, StealcBrowse
                                                                                                                                                                                                                                                                                                                                • 34.118.84.150
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                i686.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                • 56.158.127.123
                                                                                                                                                                                                                                                                                                                                i586.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                • 34.31.74.14
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                debug.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                                                                                                                • 48.103.43.102
                                                                                                                                                                                                                                                                                                                                m68k.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                                                                                                                • 51.67.196.60
                                                                                                                                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                • 151.101.1.91
                                                                                                                                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):7813
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):5.181109829317
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:192:GAjMXKyK8KncbhbVbTbfbRbObtbyEl7ngrxJA6WnSrDtTUd/SkDrF:GAYScNhnzFSJArsBnSrDhUd/f
                                                                                                                                                                                                                                                                                                                                                    MD5:CA050A5B1B5B320BAC7BB2D8058B7E13
                                                                                                                                                                                                                                                                                                                                                    SHA1:4D0ACB3F4714B289852202ADE7C6457E3FF74E17
                                                                                                                                                                                                                                                                                                                                                    SHA-256:A71F19B75E44E9A0126996DD1217070D47151409C11E8D6737FFADAF9BF03F92
                                                                                                                                                                                                                                                                                                                                                    SHA-512:6AC8A30A9C8133AF19AC8D43FD7D1514401905292A04C0B51A553FEF7099B3EB03DE86A4CC1D5B796B34AC617F35773FD4783D38377E5029B35EA44A774A1009
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"type":"uninstall","id":"e8dd76aa-8604-45a2-8d5f-9cdc0a5c30a6","creationDate":"2024-11-29T20:07:36.017Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):7813
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):5.181109829317
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:192:GAjMXKyK8KncbhbVbTbfbRbObtbyEl7ngrxJA6WnSrDtTUd/SkDrF:GAYScNhnzFSJArsBnSrDhUd/f
                                                                                                                                                                                                                                                                                                                                                    MD5:CA050A5B1B5B320BAC7BB2D8058B7E13
                                                                                                                                                                                                                                                                                                                                                    SHA1:4D0ACB3F4714B289852202ADE7C6457E3FF74E17
                                                                                                                                                                                                                                                                                                                                                    SHA-256:A71F19B75E44E9A0126996DD1217070D47151409C11E8D6737FFADAF9BF03F92
                                                                                                                                                                                                                                                                                                                                                    SHA-512:6AC8A30A9C8133AF19AC8D43FD7D1514401905292A04C0B51A553FEF7099B3EB03DE86A4CC1D5B796B34AC617F35773FD4783D38377E5029B35EA44A774A1009
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"type":"uninstall","id":"e8dd76aa-8604-45a2-8d5f-9cdc0a5c30a6","creationDate":"2024-11-29T20:07:36.017Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                                                                                                                                                    MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                                                                                                                                                    SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                                                                                                                                                    SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                                                                                                                                                    SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):453023
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                                                                                                                                                    Encrypted:true
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                                                                                                                                                    MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                                                                                                                                                    SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                                                                                                                                                    SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                                                                                                                                                    SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):3621
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):4.92692801009336
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLSxbc8P:8S+OBIUjOdwiOdYVjjwLsbc8P
                                                                                                                                                                                                                                                                                                                                                    MD5:51615A8D4B22B2D6EC3CAC1871776261
                                                                                                                                                                                                                                                                                                                                                    SHA1:B3A7ABC8CFB61398FCBC28E9102BEF61DEBAB0B5
                                                                                                                                                                                                                                                                                                                                                    SHA-256:4E7CE7EF8424510F83D5857409FE95346CE12C829BA40E022483E602BE465439
                                                                                                                                                                                                                                                                                                                                                    SHA-512:F18217695F419C834B11685A3BD6B22D406568078CB3DC80D07A573EA678731A43667B539A5A440B234C580E959CA728F4C3AA57E33D6D956DB01C89DE0CE841
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):3621
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):4.92692801009336
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLSxbc8P:8S+OBIUjOdwiOdYVjjwLsbc8P
                                                                                                                                                                                                                                                                                                                                                    MD5:51615A8D4B22B2D6EC3CAC1871776261
                                                                                                                                                                                                                                                                                                                                                    SHA1:B3A7ABC8CFB61398FCBC28E9102BEF61DEBAB0B5
                                                                                                                                                                                                                                                                                                                                                    SHA-256:4E7CE7EF8424510F83D5857409FE95346CE12C829BA40E022483E602BE465439
                                                                                                                                                                                                                                                                                                                                                    SHA-512:F18217695F419C834B11685A3BD6B22D406568078CB3DC80D07A573EA678731A43667B539A5A440B234C580E959CA728F4C3AA57E33D6D956DB01C89DE0CE841
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):5312
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                                                                                                                                    MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                                                                                                                                    SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                                                                                                                                    SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                                                                                                                                    SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):5312
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                                                                                                                                    MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                                                                                                                                    SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                                                                                                                                    SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                                                                                                                                    SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):24
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                                                                                                                    MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                                                                                                                    SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                                                                                                                    SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                                                                                                                    SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):24
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                                                                                                                    MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                                                                                                                    SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                                                                                                                    SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                                                                                                                    SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):262144
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):0.04905391753567332
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:24:DLivwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:D6wae+QtMImelekKDa5
                                                                                                                                                                                                                                                                                                                                                    MD5:DD9D28E87ED57D16E65B14501B4E54D1
                                                                                                                                                                                                                                                                                                                                                    SHA1:793839B47326441BE2D1336BA9A61C9B948C578D
                                                                                                                                                                                                                                                                                                                                                    SHA-256:BB4E6C58C50BD6399ED70468C02B584595C29F010B66F864CD4D6B427FA365BC
                                                                                                                                                                                                                                                                                                                                                    SHA-512:A2626F6A3CBADE62E38DA5987729D99830D0C6AA134D4A9E615026A5F18ACBB11A2C3C80917DAD76DA90ED5BAA9B0454D4A3C2DD04436735E78C974BA1D035B1
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):66
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                                                                                                                    MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                                                                                                                    SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                                                                                                                    SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                                                                                                                    SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):66
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                                                                                                                    MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                                                                                                                    SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                                                                                                                    SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                                                                                                                    SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):36830
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                                                                                                                                    MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                                                                                                                                    SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                                                                                                                                    SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                                                                                                                                    SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):36830
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                                                                                                                                    MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                                                                                                                                    SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                                                                                                                                    SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                                                                                                                                    SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                                                                                                                                                    MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                                                                                                                                                    SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                                                                                                                                                    SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                                                                                                                                                    SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):1021904
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                                                                                                                    MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                                                                                                                    SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                                                                                                                    SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                                                                                                                    SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):1021904
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                                                                                                                    MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                                                                                                                    SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                                                                                                                    SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                                                                                                                    SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:ASCII text
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):116
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                                                                                                                    MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                                                                                                                    SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                                                                                                                    SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                                                                                                                    SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:ASCII text
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):116
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                                                                                                                    MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                                                                                                                    SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                                                                                                                    SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                                                                                                                    SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):98304
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):0.07321379022798245
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zki7:DLhesh7Owd4+ji
                                                                                                                                                                                                                                                                                                                                                    MD5:6FAB0F77ADADA47EFB8A44C7CDB56C7A
                                                                                                                                                                                                                                                                                                                                                    SHA1:36A3640C730E27C6CA3189D9A3C056BC935BD21E
                                                                                                                                                                                                                                                                                                                                                    SHA-256:B2E30C537735D544F74CF13EEC26F9CEFB0E3B64E4ED89D677B4D25D27FE6D83
                                                                                                                                                                                                                                                                                                                                                    SHA-512:1C36C855F31C4C20CC65C5B76B355093FF1C06347A7F9E5DD35244971C93D9B9F2D963B88813DE1218BCC9AC2B3AB481C59140854DDB5EFE7EA8DDDD33283F37
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):0.035699946889726504
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:GtlstFHDIsMpzFtWK4Y1lstFHDIsMpzFtWKStlT89//alEl:GtWtasMIbY1WtasMIBtJ89XuM
                                                                                                                                                                                                                                                                                                                                                    MD5:3CC5FF95386ABCDF4F93E5FEAE61D3BC
                                                                                                                                                                                                                                                                                                                                                    SHA1:CE2B0A98E6F514553475675BDAA531F6120332D8
                                                                                                                                                                                                                                                                                                                                                    SHA-256:E589AF751819F807B7756631FB33A099FCF30CD335B50383C4C5381E3424105B
                                                                                                                                                                                                                                                                                                                                                    SHA-512:C253CA50AD7017D9C26D0DA62423D499FE5483B9D08B31A3ED13541842D9A7B45FCA0A084FA97EF41390CBBBD1DA9C395E533946CE3316C153E6B8B0541B4DC7
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:..-.....................PnR..I...%.Zq....U..s=.g..-.....................PnR..I...%.Zq....U..s=.g........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):32824
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):0.039728950852452524
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:Ol11NmAQ/ypk/cv/4wl8rEXsxdwhml8XW3R2:KEAQikEv/4wl8dMhm93w
                                                                                                                                                                                                                                                                                                                                                    MD5:7DD4C8150C842A9B30CEA294A5B04B32
                                                                                                                                                                                                                                                                                                                                                    SHA1:9733D5D0676DECCA90AAFA09624A2A43520A05E8
                                                                                                                                                                                                                                                                                                                                                    SHA-256:A05FB8C6C5EFA3FB29C0757B0FE0122756C4CE0FDD91D69EA5313EA12840B8E8
                                                                                                                                                                                                                                                                                                                                                    SHA-512:393B03837B44D03605FAEB8C5A55E02C9778FEA0BAC1191978F2C05E07061378747401F7BCF3A9EF76ECAC620BCD013C5BF3D27514C5BB60A5809D607EA3DF88
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:7....-...........%.Zq...0.(.h............%.Zq....RnP.I.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):13254
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):5.493694416946522
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:192:EnaRtLYbBp6Yhj4qyaaXL6KJfPNQPjv5RfGNBw8dKySl:ZeKqhqNQLjcw1y0
                                                                                                                                                                                                                                                                                                                                                    MD5:DBF68BDB7904C042E140D6995A3AA9FC
                                                                                                                                                                                                                                                                                                                                                    SHA1:092D3012079CB19765FD466F56EFE16B55FF8B47
                                                                                                                                                                                                                                                                                                                                                    SHA-256:D90A562ED9F8A0D72B1D980379E8F0FEE77EACF742554B568160B97F1FF2C3E2
                                                                                                                                                                                                                                                                                                                                                    SHA-512:9CEAE9A4B90A295AA3A334A7CB9B5C86A77147A712D08E07888D982E17D397618397262CAC8830BDEC3DD62CD9ED0AA5D99A35A491AB79F9204E1520DE74B4D8
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1732910826);..user_pref("app.update.lastUpdateTime.background-update-timer", 1732910826);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1732910826);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173291
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):13254
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):5.493694416946522
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:192:EnaRtLYbBp6Yhj4qyaaXL6KJfPNQPjv5RfGNBw8dKySl:ZeKqhqNQLjcw1y0
                                                                                                                                                                                                                                                                                                                                                    MD5:DBF68BDB7904C042E140D6995A3AA9FC
                                                                                                                                                                                                                                                                                                                                                    SHA1:092D3012079CB19765FD466F56EFE16B55FF8B47
                                                                                                                                                                                                                                                                                                                                                    SHA-256:D90A562ED9F8A0D72B1D980379E8F0FEE77EACF742554B568160B97F1FF2C3E2
                                                                                                                                                                                                                                                                                                                                                    SHA-512:9CEAE9A4B90A295AA3A334A7CB9B5C86A77147A712D08E07888D982E17D397618397262CAC8830BDEC3DD62CD9ED0AA5D99A35A491AB79F9204E1520DE74B4D8
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1732910826);..user_pref("app.update.lastUpdateTime.background-update-timer", 1732910826);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1732910826);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173291
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):65536
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:6:ltBl/l4/WN1h4BEJYqWvLue3FMOrMZ0l:DBl/WuntfJiFxMZO
                                                                                                                                                                                                                                                                                                                                                    MD5:18F65713B07CB441E6A98655B726D098
                                                                                                                                                                                                                                                                                                                                                    SHA1:2CEFA32BC26B25BE81C411B60C9925CB0F1F8F88
                                                                                                                                                                                                                                                                                                                                                    SHA-256:B6C268E48546B113551A5AF9CA86BB6A462A512DE6C9289315E125CEB0FD8621
                                                                                                                                                                                                                                                                                                                                                    SHA-512:A6871076C7D7ED53B630F9F144ED04303AD54A2E60B94ECA2AA96964D1AB375EEFDCA86CE0D3EB0E9DBB81470C6BD159877125A080C95EB17E54A52427F805FB
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):90
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                                                                                                                    MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                                                                                                                    SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                                                                                                                    SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                                                                                                                    SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):90
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                                                                                                                    MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                                                                                                                    SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                                                                                                                    SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                                                                                                                    SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):1571
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):6.337855309131917
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:24:v+USUGlcAxSFnLXnIgZ/pnxQwRlszT5sKtie3eHVQj6TyamhujJlOsIomNVr0aDO:GUpOxgbnR6B3eHTy4JlIquR4
                                                                                                                                                                                                                                                                                                                                                    MD5:6B2177FE4DF2A9368223E0619687E330
                                                                                                                                                                                                                                                                                                                                                    SHA1:FF66B36FC2FEFC1CE5E5474B8EC66AE6C0E181EB
                                                                                                                                                                                                                                                                                                                                                    SHA-256:2A50E42AA8DC655FB12B726501A35AB51536AC61F711337DDA51C2213D2E729C
                                                                                                                                                                                                                                                                                                                                                    SHA-512:C0C244A9BC2CBC30D2D245D69D38B321CFEEBDCAB76E0E4694184B68FA7177C547241D74A3C214D4231A11B1DC7B5C763059A4F0020E06DF659E1656677F731D
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{70c86bc9-dd8b-455f-b279-d88480699f16}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1732910830497,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`796007...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...00088,"originA...."
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):1571
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):6.337855309131917
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:24:v+USUGlcAxSFnLXnIgZ/pnxQwRlszT5sKtie3eHVQj6TyamhujJlOsIomNVr0aDO:GUpOxgbnR6B3eHTy4JlIquR4
                                                                                                                                                                                                                                                                                                                                                    MD5:6B2177FE4DF2A9368223E0619687E330
                                                                                                                                                                                                                                                                                                                                                    SHA1:FF66B36FC2FEFC1CE5E5474B8EC66AE6C0E181EB
                                                                                                                                                                                                                                                                                                                                                    SHA-256:2A50E42AA8DC655FB12B726501A35AB51536AC61F711337DDA51C2213D2E729C
                                                                                                                                                                                                                                                                                                                                                    SHA-512:C0C244A9BC2CBC30D2D245D69D38B321CFEEBDCAB76E0E4694184B68FA7177C547241D74A3C214D4231A11B1DC7B5C763059A4F0020E06DF659E1656677F731D
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{70c86bc9-dd8b-455f-b279-d88480699f16}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1732910830497,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`796007...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...00088,"originA...."
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):1571
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):6.337855309131917
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:24:v+USUGlcAxSFnLXnIgZ/pnxQwRlszT5sKtie3eHVQj6TyamhujJlOsIomNVr0aDO:GUpOxgbnR6B3eHTy4JlIquR4
                                                                                                                                                                                                                                                                                                                                                    MD5:6B2177FE4DF2A9368223E0619687E330
                                                                                                                                                                                                                                                                                                                                                    SHA1:FF66B36FC2FEFC1CE5E5474B8EC66AE6C0E181EB
                                                                                                                                                                                                                                                                                                                                                    SHA-256:2A50E42AA8DC655FB12B726501A35AB51536AC61F711337DDA51C2213D2E729C
                                                                                                                                                                                                                                                                                                                                                    SHA-512:C0C244A9BC2CBC30D2D245D69D38B321CFEEBDCAB76E0E4694184B68FA7177C547241D74A3C214D4231A11B1DC7B5C763059A4F0020E06DF659E1656677F731D
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{70c86bc9-dd8b-455f-b279-d88480699f16}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1732910830497,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`796007...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...00088,"originA...."
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):4096
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                                                                                                                                                    MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                                                                                                                                                    SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                                                                                                                                                    SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                                                                                                                                                    SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):4537
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):5.034739539221872
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:48:YrSAYEE6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyk:ycEEyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                                                                                                                                    MD5:2E8D55A7A552CE50F17CBB25A6E1FE72
                                                                                                                                                                                                                                                                                                                                                    SHA1:23B694CF0B496768AF39B633F9041AA6F8A63FFA
                                                                                                                                                                                                                                                                                                                                                    SHA-256:D018E8099416BC7F80CCB231F777DC7AFF65D24C81D217FC0BDF91440D1CB4EA
                                                                                                                                                                                                                                                                                                                                                    SHA-512:68B4ECC953DACF669B2B07FD8C9D6A6F1753C1FA41E47CC968FFAFFDE124E82887DDBBF5E07F7C060082B79830F7876AED5F2F661E58E6D083938C17886D3585
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-11-29T20:06:46.449Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                                                                                                                    Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                                                                                                                    Size (bytes):4537
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):5.034739539221872
                                                                                                                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:48:YrSAYEE6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyk:ycEEyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                                                                                                                                    MD5:2E8D55A7A552CE50F17CBB25A6E1FE72
                                                                                                                                                                                                                                                                                                                                                    SHA1:23B694CF0B496768AF39B633F9041AA6F8A63FFA
                                                                                                                                                                                                                                                                                                                                                    SHA-256:D018E8099416BC7F80CCB231F777DC7AFF65D24C81D217FC0BDF91440D1CB4EA
                                                                                                                                                                                                                                                                                                                                                    SHA-512:68B4ECC953DACF669B2B07FD8C9D6A6F1753C1FA41E47CC968FFAFFDE124E82887DDBBF5E07F7C060082B79830F7876AED5F2F661E58E6D083938C17886D3585
                                                                                                                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                                                                                                                    Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-11-29T20:06:46.449Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                                                                                                                    Entropy (8bit):6.592368676511987
                                                                                                                                                                                                                                                                                                                                                    TrID:
                                                                                                                                                                                                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                                                                                                                    File name:file.exe
                                                                                                                                                                                                                                                                                                                                                    File size:922'624 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5:0c37b6b31773e922a0c8521a372fb1ea
                                                                                                                                                                                                                                                                                                                                                    SHA1:d57ca0a2d3012d3cba3d6093bb82ef2d6d454628
                                                                                                                                                                                                                                                                                                                                                    SHA256:0ee84b8643c4b64870ebbb47ac96d156b7144a15cf81b8524e9d36defcfa6451
                                                                                                                                                                                                                                                                                                                                                    SHA512:9c63261a2f8065742a1e533fe76a21b4b3a82315fbe5f7ab9aeb9b8aa09023a6948d0728e546f4fdfe6438aba3c047853fc185ac89cff0c5e127346df147af45
                                                                                                                                                                                                                                                                                                                                                    SSDEEP:12288:YqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaCTE:YqDEvCTbMWu7rQYlBQcBiT6rprG8aiE
                                                                                                                                                                                                                                                                                                                                                    TLSH:51159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                                                                                                                                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                                                                                                                                                    Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                                                                                                                                                    Entrypoint:0x420577
                                                                                                                                                                                                                                                                                                                                                    Entrypoint Section:.text
                                                                                                                                                                                                                                                                                                                                                    Digitally signed:false
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                                                                                                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                                                                                                                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                                                                                                                    Time Stamp:0x674A09A8 [Fri Nov 29 18:36:24 2024 UTC]
                                                                                                                                                                                                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                                                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                                                                                                                                                                                                    OS Version Major:5
                                                                                                                                                                                                                                                                                                                                                    OS Version Minor:1
                                                                                                                                                                                                                                                                                                                                                    File Version Major:5
                                                                                                                                                                                                                                                                                                                                                    File Version Minor:1
                                                                                                                                                                                                                                                                                                                                                    Subsystem Version Major:5
                                                                                                                                                                                                                                                                                                                                                    Subsystem Version Minor:1
                                                                                                                                                                                                                                                                                                                                                    Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                                                                                                                                                    Instruction
                                                                                                                                                                                                                                                                                                                                                    call 00007F408CE4F2A3h
                                                                                                                                                                                                                                                                                                                                                    jmp 00007F408CE4EBAFh
                                                                                                                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                                                                                                                    push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                    mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                    call 00007F408CE4ED8Dh
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                                                                                                                                                    mov eax, esi
                                                                                                                                                                                                                                                                                                                                                    pop esi
                                                                                                                                                                                                                                                                                                                                                    pop ebp
                                                                                                                                                                                                                                                                                                                                                    retn 0004h
                                                                                                                                                                                                                                                                                                                                                    and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                    mov eax, ecx
                                                                                                                                                                                                                                                                                                                                                    and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                                                                                                                                                    ret
                                                                                                                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                                                                                                                    push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                    mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                    call 00007F408CE4ED5Ah
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                                                                                                                                                    mov eax, esi
                                                                                                                                                                                                                                                                                                                                                    pop esi
                                                                                                                                                                                                                                                                                                                                                    pop ebp
                                                                                                                                                                                                                                                                                                                                                    retn 0004h
                                                                                                                                                                                                                                                                                                                                                    and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                    mov eax, ecx
                                                                                                                                                                                                                                                                                                                                                    and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                                                                                                                                                    ret
                                                                                                                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                                                                                                                    mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                    lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                    and dword ptr [eax], 00000000h
                                                                                                                                                                                                                                                                                                                                                    and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                                                                                                                    mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                    add eax, 04h
                                                                                                                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                                                                                                                    call 00007F408CE5194Dh
                                                                                                                                                                                                                                                                                                                                                    pop ecx
                                                                                                                                                                                                                                                                                                                                                    pop ecx
                                                                                                                                                                                                                                                                                                                                                    mov eax, esi
                                                                                                                                                                                                                                                                                                                                                    pop esi
                                                                                                                                                                                                                                                                                                                                                    pop ebp
                                                                                                                                                                                                                                                                                                                                                    retn 0004h
                                                                                                                                                                                                                                                                                                                                                    lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                                                                                                                    call 00007F408CE51998h
                                                                                                                                                                                                                                                                                                                                                    pop ecx
                                                                                                                                                                                                                                                                                                                                                    ret
                                                                                                                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                    push esi
                                                                                                                                                                                                                                                                                                                                                    mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                    lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                                                                                                                    mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                    push eax
                                                                                                                                                                                                                                                                                                                                                    call 00007F408CE51981h
                                                                                                                                                                                                                                                                                                                                                    test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                                                                                                                                                    pop ecx
                                                                                                                                                                                                                                                                                                                                                    Programming Language:
                                                                                                                                                                                                                                                                                                                                                    • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                                                                                                                    • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000xa850.rsrc
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xdf0000x7594.reloc
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                                                                                                                    .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                    .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                    .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                                                                                                                    .rsrc0xd40000xa8500xaa00d0d47210207f56e03aa0c91309114f95False0.3685891544117647data5.6496244010773236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                    .reloc0xdf0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                                                                                                                                                    RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                                                                                                                                                    RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                                                                                                                                                    RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                                                                                                                    RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                                                                                                                                                    RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                                                                                                                                                    RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                                                                                                                                                    RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                                                                                                                                                    RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                                                                                                                                                    RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                                                                                                                                                    RT_RCDATA0xdc7b80x1b16data1.0015863859244303
                                                                                                                                                                                                                                                                                                                                                    RT_GROUP_ICON0xde2d00x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                                                                                                                                                    RT_GROUP_ICON0xde3480x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                                                                                                                    RT_GROUP_ICON0xde35c0x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                                                                                                                                                    RT_GROUP_ICON0xde3700x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                                                                                                                    RT_VERSION0xde3840xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                                                                                                                                                    RT_MANIFEST0xde4600x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                                                                                                                                                    DLLImport
                                                                                                                                                                                                                                                                                                                                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                                                                                                                                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                                                                                                                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                                                                                                                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                                                                                                                                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                                                                                                                                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                                                                                                                                                    PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                                                                                                                                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                                                                                                                                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                                                                                                                                                    UxTheme.dllIsThemeActive
                                                                                                                                                                                                                                                                                                                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                                                                                                                                                    USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                                                                                                                                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                                                                                                                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                                                                                                                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                                                                                                                                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                                                                                                                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                                                                                                                                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                                                                                                                    EnglishGreat Britain
                                                                                                                                                                                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.007647038 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.007710934 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.021572113 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.052828074 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.052859068 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.024584055 CET49738443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.024626017 CET44349738142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.026484966 CET49738443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.027909994 CET49738443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.027925968 CET44349738142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.072448969 CET49739443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.072478056 CET44349739142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.073748112 CET49739443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.075161934 CET49739443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.075177908 CET44349739142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.316777945 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.323544025 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.323559999 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.323633909 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.355525017 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.355587006 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.363789082 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.368132114 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.368154049 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.368274927 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.368453979 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.368489981 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.368503094 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.370820045 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.383517027 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.383538008 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.386461020 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.388144970 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.388154984 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.436714888 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.437051058 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.437201023 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.557311058 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.565875053 CET49743443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.565911055 CET4434974334.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.568164110 CET49743443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.569669008 CET49743443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.569688082 CET4434974334.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.527415991 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.576838017 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.636059046 CET49745443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.636081934 CET4434974535.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.636253119 CET49745443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.636401892 CET49745443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.636418104 CET4434974535.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.680526972 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.680541039 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.684699059 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.687693119 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.687701941 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.687978983 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.690340996 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.690469980 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.690493107 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.690613985 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.702735901 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.702841043 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.707318068 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.707326889 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.707370043 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.707539082 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.708386898 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.792417049 CET4434974334.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.792486906 CET49743443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.797200918 CET49743443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.797208071 CET4434974334.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.797276974 CET49743443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.797517061 CET4434974334.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.797571898 CET49743443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.810157061 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.811383963 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.811423063 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.811645985 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.811779976 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.811795950 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.812556982 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.814595938 CET44349738142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.814670086 CET49738443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.815274000 CET44349738142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.815931082 CET49738443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.819482088 CET49738443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.819492102 CET44349738142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.819571972 CET49738443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.819649935 CET44349738142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.819708109 CET49738443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.858160019 CET44349739142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.858397007 CET49739443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.858865976 CET44349739142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.858923912 CET49739443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.863507986 CET49739443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.863519907 CET44349739142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.863627911 CET49739443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.863738060 CET44349739142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.864001036 CET49748443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.864021063 CET44349748142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.864063025 CET49739443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.864202976 CET49748443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.865502119 CET49748443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.865514040 CET44349748142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.931216955 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.931616068 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.932967901 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.933710098 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.933922052 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.054564953 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.227087021 CET49750443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.227128029 CET4434975034.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.227864027 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.229182005 CET49752443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.229190111 CET4434975234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.229610920 CET49750443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.229706049 CET49752443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.231061935 CET49750443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.231077909 CET4434975034.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.232310057 CET49752443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.232322931 CET4434975234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.349085093 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.349158049 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.349345922 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.388825893 CET49753443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.388870955 CET4434975334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.389106989 CET49753443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.390501976 CET49753443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.390537024 CET4434975334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.469577074 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.854487896 CET49754443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.854531050 CET4434975434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.854918957 CET49754443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.856399059 CET49754443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.856415987 CET4434975434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.939409971 CET4434974535.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.939486027 CET49745443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.942230940 CET49745443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.942240000 CET4434974535.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.942485094 CET4434974535.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.945106030 CET49745443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.945188999 CET49745443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.945260048 CET4434974535.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.945642948 CET49745443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.028881073 CET49755443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.028918982 CET4434975534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.029328108 CET49755443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.030875921 CET49755443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.030894995 CET4434975534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.068242073 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.077341080 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.077410936 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.080101013 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.080110073 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.080352068 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.082634926 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.082717896 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.082806110 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.092112064 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.111366034 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.452198982 CET4434975234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.452276945 CET49752443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.456785917 CET49752443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.456799984 CET4434975234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.456934929 CET49752443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.456988096 CET4434975234.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.457040071 CET49752443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.457400084 CET49756443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.457437992 CET4434975634.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.457495928 CET49756443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.458862066 CET49756443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.458878994 CET4434975634.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.482656002 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.496602058 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.541125059 CET4434975034.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.541847944 CET49750443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.543771982 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.605375051 CET4434975334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.608112097 CET49753443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.613065958 CET44349748142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.613931894 CET44349748142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.614905119 CET49748443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.614919901 CET44349748142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.616666079 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.636311054 CET49750443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.636341095 CET4434975034.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.636399031 CET49750443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.636559963 CET4434975034.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.639051914 CET49750443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.640966892 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.659701109 CET49748443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.671271086 CET49753443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.671291113 CET4434975334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.671379089 CET49753443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.671503067 CET4434975334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.672246933 CET49748443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.672251940 CET44349748142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.672334909 CET49748443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.672472954 CET44349748142.250.181.142192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.673029900 CET49753443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.673047066 CET49748443192.168.2.4142.250.181.142
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.761843920 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.820920944 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.823671103 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.823698044 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.824189901 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.825674057 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.825689077 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.875900030 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.966245890 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.969265938 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.013982058 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.089229107 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.164696932 CET4434975434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.164767981 CET49754443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.244201899 CET4434975534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.244330883 CET49755443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.294301033 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.318844080 CET49754443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.318871021 CET4434975434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.318912983 CET49754443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.319159031 CET4434975434.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.319722891 CET49755443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.319744110 CET4434975534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.319825888 CET49755443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.320005894 CET4434975534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.320199966 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.320244074 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.320271969 CET49754443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.320286989 CET49755443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.320506096 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.321892023 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.321912050 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.346107006 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.680764914 CET4434975634.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.680847883 CET49756443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.685323954 CET49756443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.685338974 CET4434975634.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.685430050 CET49756443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.685520887 CET4434975634.117.188.166192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.685604095 CET49756443192.168.2.434.117.188.166
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.082243919 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.082319975 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.117032051 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.117052078 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.117264986 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.117295980 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.117301941 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.323328018 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.323384047 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.581202030 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.591334105 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.594373941 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.935986042 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.936021090 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.936074018 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.936335087 CET4434975934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:17.936392069 CET49759443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.356686115 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.360105991 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.360153913 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.360336065 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.360366106 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.360560894 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.360594988 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.360805988 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.360826969 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.361370087 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.361383915 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362164021 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362165928 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362169981 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362181902 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362190008 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362545967 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362557888 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362672091 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362684011 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362739086 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362751007 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362816095 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.362829924 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.364166021 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.364181995 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.476598978 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.681876898 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.725652933 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.973481894 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.024936914 CET49767443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.024976969 CET4434976734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.025260925 CET49767443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.026861906 CET49767443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.026875973 CET4434976734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.093764067 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.298086882 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.343087912 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.573266029 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.573342085 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.574536085 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.574687004 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.576797009 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.576803923 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.577061892 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.579370975 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.579376936 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.579659939 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.583158970 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.583268881 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.583297014 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.583525896 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.583580017 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.583692074 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.583726883 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.583770990 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.586113930 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.620448112 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.620520115 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.668600082 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.668601990 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.668687105 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.668687105 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.706084967 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.910756111 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.924453974 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.924474001 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.924783945 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.926985979 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.927004099 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.927295923 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.960385084 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.976028919 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.976061106 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.293394089 CET4434976734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.293468952 CET49767443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.344150066 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345026970 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345324993 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345403910 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345417023 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345485926 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345679045 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345721006 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345791101 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345803976 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345856905 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345968008 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.345998049 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.346055031 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.347955942 CET49767443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.347970009 CET4434976734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.348015070 CET49767443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.348138094 CET4434976734.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.361602068 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.361637115 CET49767443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.464118958 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.668572903 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.715877056 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:25.046299934 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:25.166280985 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:25.371048927 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:25.430465937 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:26.834851027 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:26.954780102 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:27.159754038 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:27.204528093 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.264149904 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.264173031 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.264575958 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.266083956 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.266098022 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.397089005 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.517870903 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.525995016 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.526123047 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.530597925 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.530602932 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.530703068 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.530775070 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.530889988 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.533524990 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.653857946 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.858602047 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.862756014 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.901434898 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.984150887 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:37.188167095 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:37.233632088 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.561237097 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.561284065 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.563783884 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.563884974 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.563894033 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.605118990 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.605175018 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.605331898 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.605349064 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.617819071 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.617964983 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.618083000 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.618099928 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.619577885 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.619591951 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.763609886 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.763649940 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.763794899 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.765244961 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.765258074 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.816953897 CET49778443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.816984892 CET44349778151.101.1.91192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.818842888 CET49778443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.819137096 CET49778443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.819149971 CET44349778151.101.1.91192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.835879087 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.835913897 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.835978031 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.839169025 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.839179993 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.839445114 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.841269970 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.841404915 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.841417074 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.841803074 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.841844082 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.841882944 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.841882944 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.841953039 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.842084885 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.842101097 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.869155884 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.874048948 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.877192020 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.877204895 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.877495050 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.884587049 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.884675980 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.884793997 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.884874105 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.884896040 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.885322094 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.885339022 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.889197111 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.889204979 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.889282942 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.889394999 CET4434977635.190.72.216192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.890820980 CET49776443192.168.2.435.190.72.216
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.891545057 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.993169069 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.993262053 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.997448921 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.997458935 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.997550964 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.997651100 CET4434977735.201.103.21192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.997776985 CET49777443192.168.2.435.201.103.21
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.009361029 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.009454966 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.009581089 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.009736061 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.009756088 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.011461020 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.135643005 CET44349778151.101.1.91192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.135751009 CET49778443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.138904095 CET49778443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.138916016 CET44349778151.101.1.91192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.139163971 CET44349778151.101.1.91192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.141458035 CET49778443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.141551018 CET49778443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.141609907 CET44349778151.101.1.91192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.148627996 CET49778443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.150333881 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.150369883 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.150568962 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.150691986 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.150703907 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.152848959 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.152898073 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.153418064 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.153516054 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.153532982 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.154778004 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.154788971 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.155029058 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.155117989 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.155128956 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.217521906 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.222575903 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.260720015 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.342561007 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.546509981 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.592839956 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.052236080 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.052421093 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.055583000 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.055596113 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.055847883 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.058286905 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.058379889 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.058446884 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.058741093 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.061614990 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.181606054 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.267936945 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.268009901 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.271330118 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.271336079 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.271595001 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.273897886 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.274003029 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.274085045 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.274838924 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.365825891 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.365988970 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.369029999 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.369044065 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.369291067 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.371937990 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.372024059 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.372102022 CET4434978335.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.372735977 CET49783443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.386130095 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.388993025 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.410617113 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.410868883 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.413767099 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.413778067 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.414113045 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.416454077 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.416546106 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.416652918 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.416709900 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.420818090 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.453958035 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.454071045 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.456994057 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.457001925 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.457247019 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.459623098 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.459729910 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.459774017 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.462140083 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.509027958 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.540915966 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.713140965 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.746264935 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.749563932 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.795911074 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.869450092 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:42.073698997 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:42.128041983 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:51.756222010 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:51.877207041 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:52.094880104 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:52.214715004 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.837788105 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.837826967 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.838226080 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.839725971 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.839739084 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.052206993 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.052331924 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.057588100 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.057601929 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.057701111 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.057780027 CET4434978634.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.058804989 CET49786443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.061676025 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.182809114 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.385910034 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.388962984 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.428844929 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.508936882 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.713152885 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.760978937 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.388902903 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.509912968 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.638819933 CET49813443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.638855934 CET4434981334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.638973951 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639018059 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639091015 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639101982 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639164925 CET49813443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639345884 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639345884 CET49813443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639347076 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639375925 CET4434981334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639472961 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639486074 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639611006 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.639635086 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.721025944 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.840958118 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.852329969 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.852432013 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.855854988 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.855865955 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.856127977 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.858566999 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.858684063 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.858730078 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.861459970 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.862821102 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.897440910 CET4434981334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.897567034 CET49813443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.900970936 CET49813443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.900981903 CET4434981334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.901316881 CET4434981334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.903645039 CET49813443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.903762102 CET49813443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.903831005 CET4434981334.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.904429913 CET49813443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.945015907 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.945198059 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.948652983 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.948668957 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.948936939 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.951874018 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.951999903 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.952116013 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.952188015 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.983267069 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.187992096 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.190917969 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.247571945 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.310965061 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.520770073 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.564244986 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:20.191090107 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:20.312069893 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:20.523195028 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:20.643135071 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:30.319475889 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:30.439455032 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:30.651623011 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:30.771614075 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.151601076 CET49881443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.151657104 CET4434988134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.152297974 CET49881443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.153820038 CET49881443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.153842926 CET4434988134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.413558006 CET4434988134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.413669109 CET49881443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.420223951 CET49881443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.420236111 CET4434988134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.420361996 CET49881443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.420404911 CET4434988134.107.243.93192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.421219110 CET49881443192.168.2.434.107.243.93
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.423152924 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.449582100 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.543025970 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.569448948 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.747437000 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.751182079 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.781399965 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.797008991 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.871073961 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.901402950 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:41.075228930 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:41.135737896 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:50.763829947 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:50.884006977 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:51.080420017 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:51.200387955 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:00.892654896 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:01.013535976 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:01.209151983 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:01.329124928 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:11.022584915 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:11.142448902 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:11.345658064 CET4974780192.168.2.434.107.221.82
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:11.465637922 CET804974734.107.221.82192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.008913040 CET5442653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.153345108 CET53544261.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.154509068 CET5361953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.294435024 CET53536191.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.879616022 CET6042753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.879894972 CET5202953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.019772053 CET53604271.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.025418043 CET5418153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.027381897 CET5827953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.162848949 CET53541811.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.166059971 CET53582791.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.166538000 CET5264353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.168339014 CET5489153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.203033924 CET6330253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.307852983 CET53526431.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.308964014 CET53548911.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.331382990 CET5597053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.338363886 CET6046053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.343632936 CET53633021.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.383852005 CET5142653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.478513002 CET53559701.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.483282089 CET53604601.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.483875036 CET5098653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.523623943 CET53514261.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.524317980 CET6262453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.567318916 CET5527753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.585036039 CET5473253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.622530937 CET53509861.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.662034988 CET53626241.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.704993010 CET53552771.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.722294092 CET6188253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.859837055 CET53618821.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.389832973 CET53619731.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.517748117 CET5467053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.613028049 CET6378653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.636023045 CET5172053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.655433893 CET53546701.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.660712004 CET5272553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.671116114 CET6152753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.671520948 CET5934653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.750574112 CET53637861.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.773471117 CET53517201.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.799074888 CET53527251.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.802078962 CET6211253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.809252977 CET53615271.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.811584949 CET5962753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.939538956 CET53621121.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.950196028 CET53596271.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.972598076 CET6491753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.110048056 CET53649171.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.388998032 CET5700853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.526674986 CET53570081.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.527355909 CET5559653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.666593075 CET53555961.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.715584993 CET4938553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.853614092 CET53493851.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.854845047 CET5635153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.994893074 CET53563511.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.996476889 CET5566853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.136847973 CET53556681.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.181164026 CET4977853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.181593895 CET6277853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.181971073 CET5009253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET53497781.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319643974 CET53627781.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.320133924 CET53500921.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.320367098 CET5375553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.320719957 CET5062453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.323331118 CET6274253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.458062887 CET53537551.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET53627421.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460902929 CET6481253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.462374926 CET5611253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.528358936 CET53506241.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.530390024 CET6192253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.599920988 CET53648121.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.600204945 CET53561121.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.602781057 CET6515753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.602854013 CET5555753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.741652966 CET53651571.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.742413998 CET53555571.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.742425919 CET5821153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.742955923 CET6204053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.746896029 CET53619221.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.880695105 CET53620401.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.880949974 CET53582111.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.881386995 CET6464353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.881896019 CET6008953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.018793106 CET53646431.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.098326921 CET53600891.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:18.936587095 CET5980853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.076381922 CET53598081.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.272763968 CET5866853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.412168026 CET53586681.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.412919998 CET5304053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.552067995 CET53530401.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.368107080 CET6152153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.505652905 CET53615211.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.025574923 CET5180653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.168190956 CET53518061.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.264501095 CET5399053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.402347088 CET53539901.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.561677933 CET5526853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.582825899 CET5608153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.607673883 CET5990653192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.620222092 CET6180753192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.703263044 CET53552681.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.703958988 CET5929053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.762586117 CET53618071.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.811816931 CET53560811.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.836030006 CET53599061.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.841770887 CET6226153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.841989994 CET6382053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.842504025 CET53592901.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.843518019 CET4918153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.980098963 CET53622611.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.980283976 CET53638201.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.981117010 CET4982553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.981914043 CET53491811.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.982521057 CET6167153192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.119508982 CET53498251.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.120815039 CET53616711.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.697576046 CET4993453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.836606026 CET53499341.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.838145018 CET6327453192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.979804993 CET53632741.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.638676882 CET5378953192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.776519060 CET53537891.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.863373041 CET6392853192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.007163048 CET6292053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.191108942 CET5184053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.330225945 CET4976353192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.010004997 CET4959253192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.148037910 CET53495921.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.154408932 CET5311553192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.292509079 CET53531151.1.1.1192.168.2.4
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.423398018 CET5941053192.168.2.41.1.1.1
                                                                                                                                                                                                                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.008913040 CET192.168.2.41.1.1.10x1713Standard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.154509068 CET192.168.2.41.1.1.10x7509Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.879616022 CET192.168.2.41.1.1.10xb816Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.879894972 CET192.168.2.41.1.1.10x65d6Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.025418043 CET192.168.2.41.1.1.10x623Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.027381897 CET192.168.2.41.1.1.10x2503Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.166538000 CET192.168.2.41.1.1.10x26cfStandard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.168339014 CET192.168.2.41.1.1.10xef0cStandard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.203033924 CET192.168.2.41.1.1.10x7fe4Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.331382990 CET192.168.2.41.1.1.10xefb5Standard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.338363886 CET192.168.2.41.1.1.10xf88bStandard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.383852005 CET192.168.2.41.1.1.10x3488Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.483875036 CET192.168.2.41.1.1.10x4c4bStandard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.524317980 CET192.168.2.41.1.1.10x72f9Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.567318916 CET192.168.2.41.1.1.10xa4f5Standard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.585036039 CET192.168.2.41.1.1.10x21ebStandard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.722294092 CET192.168.2.41.1.1.10x83f6Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.517748117 CET192.168.2.41.1.1.10x4a86Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.613028049 CET192.168.2.41.1.1.10xe0e4Standard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.636023045 CET192.168.2.41.1.1.10xd9cdStandard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.660712004 CET192.168.2.41.1.1.10x9c9bStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.671116114 CET192.168.2.41.1.1.10xd87Standard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.671520948 CET192.168.2.41.1.1.10x308cStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.802078962 CET192.168.2.41.1.1.10xd422Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.811584949 CET192.168.2.41.1.1.10xd3efStandard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.972598076 CET192.168.2.41.1.1.10x6a88Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.388998032 CET192.168.2.41.1.1.10x79aeStandard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.527355909 CET192.168.2.41.1.1.10xe750Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.715584993 CET192.168.2.41.1.1.10xd50bStandard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.854845047 CET192.168.2.41.1.1.10x377dStandard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.996476889 CET192.168.2.41.1.1.10xe6fdStandard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.181164026 CET192.168.2.41.1.1.10x94f2Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.181593895 CET192.168.2.41.1.1.10x5407Standard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.181971073 CET192.168.2.41.1.1.10x7320Standard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.320367098 CET192.168.2.41.1.1.10x62a8Standard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.320719957 CET192.168.2.41.1.1.10xf676Standard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.323331118 CET192.168.2.41.1.1.10x3f85Standard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460902929 CET192.168.2.41.1.1.10xc612Standard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.462374926 CET192.168.2.41.1.1.10xe4eeStandard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.530390024 CET192.168.2.41.1.1.10x6f71Standard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.602781057 CET192.168.2.41.1.1.10xe9afStandard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.602854013 CET192.168.2.41.1.1.10xf57dStandard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.742425919 CET192.168.2.41.1.1.10x1ba7Standard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.742955923 CET192.168.2.41.1.1.10x188dStandard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.881386995 CET192.168.2.41.1.1.10x4aa7Standard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.881896019 CET192.168.2.41.1.1.10x3ac6Standard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:18.936587095 CET192.168.2.41.1.1.10x7563Standard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.272763968 CET192.168.2.41.1.1.10x25a1Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.412919998 CET192.168.2.41.1.1.10x8644Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.368107080 CET192.168.2.41.1.1.10x7a70Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.025574923 CET192.168.2.41.1.1.10x72cfStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.264501095 CET192.168.2.41.1.1.10xe514Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.561677933 CET192.168.2.41.1.1.10x1acfStandard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.582825899 CET192.168.2.41.1.1.10x779fStandard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.607673883 CET192.168.2.41.1.1.10x4aabStandard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.620222092 CET192.168.2.41.1.1.10xb98cStandard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.703958988 CET192.168.2.41.1.1.10xad97Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.841770887 CET192.168.2.41.1.1.10xa113Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.841989994 CET192.168.2.41.1.1.10xf7c0Standard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.843518019 CET192.168.2.41.1.1.10x58c6Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.981117010 CET192.168.2.41.1.1.10xa27eStandard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.982521057 CET192.168.2.41.1.1.10x8a0fStandard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.697576046 CET192.168.2.41.1.1.10x12aeStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.838145018 CET192.168.2.41.1.1.10x6f2dStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.638676882 CET192.168.2.41.1.1.10x1b04Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.863373041 CET192.168.2.41.1.1.10xc157Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.007163048 CET192.168.2.41.1.1.10x8c42Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.191108942 CET192.168.2.41.1.1.10x2f7Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.330225945 CET192.168.2.41.1.1.10x2225Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.010004997 CET192.168.2.41.1.1.10xac13Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.154408932 CET192.168.2.41.1.1.10x8eadStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.423398018 CET192.168.2.41.1.1.10xfde8Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:10.982779980 CET1.1.1.1192.168.2.40x1adNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:11.153345108 CET1.1.1.1192.168.2.40x1713No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.019772053 CET1.1.1.1192.168.2.40xb816No error (0)youtube.com142.250.181.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.020714998 CET1.1.1.1192.168.2.40x65d6No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.020714998 CET1.1.1.1192.168.2.40x65d6No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.162848949 CET1.1.1.1192.168.2.40x623No error (0)youtube.com142.250.181.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.166059971 CET1.1.1.1192.168.2.40x2503No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.307852983 CET1.1.1.1192.168.2.40x26cfNo error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.308964014 CET1.1.1.1192.168.2.40xef0cNo error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.337078094 CET1.1.1.1192.168.2.40xf140No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.337078094 CET1.1.1.1192.168.2.40xf140No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.343632936 CET1.1.1.1192.168.2.40x7fe4No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.478513002 CET1.1.1.1192.168.2.40xefb5No error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.478513002 CET1.1.1.1192.168.2.40xefb5No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.483282089 CET1.1.1.1192.168.2.40xf88bNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.523623943 CET1.1.1.1192.168.2.40x3488No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.704993010 CET1.1.1.1192.168.2.40xa4f5No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.815562010 CET1.1.1.1192.168.2.40x21ebNo error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.635067940 CET1.1.1.1192.168.2.40x3c82No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.635067940 CET1.1.1.1192.168.2.40x3c82No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.655433893 CET1.1.1.1192.168.2.40x4a86No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.750574112 CET1.1.1.1192.168.2.40xe0e4No error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.773471117 CET1.1.1.1192.168.2.40xd9cdNo error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.773471117 CET1.1.1.1192.168.2.40xd9cdNo error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.799074888 CET1.1.1.1192.168.2.40x9c9bNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.809252977 CET1.1.1.1192.168.2.40xd87No error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.809252977 CET1.1.1.1192.168.2.40xd87No error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.809252977 CET1.1.1.1192.168.2.40xd87No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.810309887 CET1.1.1.1192.168.2.40x308cNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.810309887 CET1.1.1.1192.168.2.40x308cNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.950196028 CET1.1.1.1192.168.2.40xd3efNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.110048056 CET1.1.1.1192.168.2.40x6a88No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.387870073 CET1.1.1.1192.168.2.40x24a4No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.526674986 CET1.1.1.1192.168.2.40x79aeNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.853614092 CET1.1.1.1192.168.2.40xd50bNo error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.853614092 CET1.1.1.1192.168.2.40xd50bNo error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.994893074 CET1.1.1.1192.168.2.40x377dNo error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com172.217.19.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com142.250.181.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com142.250.181.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com172.217.19.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com142.250.181.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com172.217.17.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com216.58.208.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com172.217.19.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319396973 CET1.1.1.1192.168.2.40x94f2No error (0)youtube-ui.l.google.com172.217.17.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319643974 CET1.1.1.1192.168.2.40x5407No error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.319643974 CET1.1.1.1192.168.2.40x5407No error (0)star-mini.c10r.facebook.com157.240.196.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.320133924 CET1.1.1.1192.168.2.40x7320No error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.320133924 CET1.1.1.1192.168.2.40x7320No error (0)dyna.wikimedia.org185.15.58.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.458062887 CET1.1.1.1192.168.2.40x62a8No error (0)star-mini.c10r.facebook.com157.240.196.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com172.217.17.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com172.217.17.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com172.217.19.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com172.217.21.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com142.250.181.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com142.250.181.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com216.58.208.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com142.250.181.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.460766077 CET1.1.1.1192.168.2.40x3f85No error (0)youtube-ui.l.google.com172.217.19.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.528358936 CET1.1.1.1192.168.2.40xf676No error (0)dyna.wikimedia.org185.15.58.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.599920988 CET1.1.1.1192.168.2.40xc612No error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.600204945 CET1.1.1.1192.168.2.40xe4eeNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.600204945 CET1.1.1.1192.168.2.40xe4eeNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.600204945 CET1.1.1.1192.168.2.40xe4eeNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.600204945 CET1.1.1.1192.168.2.40xe4eeNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.741652966 CET1.1.1.1192.168.2.40xe9afNo error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.741652966 CET1.1.1.1192.168.2.40xe9afNo error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.741652966 CET1.1.1.1192.168.2.40xe9afNo error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.741652966 CET1.1.1.1192.168.2.40xe9afNo error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.741652966 CET1.1.1.1192.168.2.40xe9afNo error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.742413998 CET1.1.1.1192.168.2.40xf57dNo error (0)twitter.com104.244.42.193A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.746896029 CET1.1.1.1192.168.2.40x6f71No error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.818177938 CET1.1.1.1192.168.2.40xadc6No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.880695105 CET1.1.1.1192.168.2.40x188dNo error (0)twitter.com104.244.42.193A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.880949974 CET1.1.1.1192.168.2.40x1ba7No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.880949974 CET1.1.1.1192.168.2.40x1ba7No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.880949974 CET1.1.1.1192.168.2.40x1ba7No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.880949974 CET1.1.1.1192.168.2.40x1ba7No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.076381922 CET1.1.1.1192.168.2.40x7563No error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.076381922 CET1.1.1.1192.168.2.40x7563No error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.076381922 CET1.1.1.1192.168.2.40x7563No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:19.412168026 CET1.1.1.1192.168.2.40x25a1No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.703263044 CET1.1.1.1192.168.2.40x1acfNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.750588894 CET1.1.1.1192.168.2.40x5204No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.762586117 CET1.1.1.1192.168.2.40xb98cNo error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.762586117 CET1.1.1.1192.168.2.40xb98cNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.811816931 CET1.1.1.1192.168.2.40x779fNo error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.811816931 CET1.1.1.1192.168.2.40x779fNo error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.811816931 CET1.1.1.1192.168.2.40x779fNo error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.811816931 CET1.1.1.1192.168.2.40x779fNo error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.836030006 CET1.1.1.1192.168.2.40x4aabNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.980283976 CET1.1.1.1192.168.2.40xf7c0No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.981914043 CET1.1.1.1192.168.2.40x58c6No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.981914043 CET1.1.1.1192.168.2.40x58c6No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.981914043 CET1.1.1.1192.168.2.40x58c6No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:38.981914043 CET1.1.1.1192.168.2.40x58c6No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.120815039 CET1.1.1.1192.168.2.40x8a0fNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.120815039 CET1.1.1.1192.168.2.40x8a0fNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.120815039 CET1.1.1.1192.168.2.40x8a0fNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.120815039 CET1.1.1.1192.168.2.40x8a0fNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:42.223867893 CET1.1.1.1192.168.2.40xb613No error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:42.223867893 CET1.1.1.1192.168.2.40xb613No error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:56.836606026 CET1.1.1.1192.168.2.40x12aeNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.637195110 CET1.1.1.1192.168.2.40x42d6No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.005981922 CET1.1.1.1192.168.2.40xc157No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.005981922 CET1.1.1.1192.168.2.40xc157No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.145548105 CET1.1.1.1192.168.2.40x8c42No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.145548105 CET1.1.1.1192.168.2.40x8c42No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.328927994 CET1.1.1.1192.168.2.40x2f7No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.328927994 CET1.1.1.1192.168.2.40x2f7No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.468728065 CET1.1.1.1192.168.2.40x2225No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.468728065 CET1.1.1.1192.168.2.40x2225No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:39.148037910 CET1.1.1.1192.168.2.40xac13No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.561675072 CET1.1.1.1192.168.2.40xfde8No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.561675072 CET1.1.1.1192.168.2.40xfde8No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                    • detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                    0192.168.2.44974034.107.221.82807876C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:12.437201023 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.527415991 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 01:51:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 61065
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                    1192.168.2.44974734.107.221.82807876C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:13.933922052 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.068242073 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47326
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.496602058 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.820920944 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47327
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.969265938 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:16.294301033 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47328
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.973481894 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.298086882 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47335
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.344150066 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:24.668572903 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47336
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:26.834851027 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:27.159754038 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47338
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.862756014 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:37.188167095 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47349
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.222575903 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.546509981 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47352
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.388993025 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.713140965 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47353
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.749563932 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:42.073698997 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47353
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:52.094880104 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.388962984 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.713152885 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47370
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.721025944 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.190917969 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.520770073 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47382
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:20.523195028 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:30.651623011 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.751182079 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.781399965 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:41.075228930 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Fri, 29 Nov 2024 05:40:28 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 47412
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:51.080420017 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:01.209151983 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:11.345658064 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:


                                                                                                                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                    2192.168.2.44975134.107.221.82807876C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:14.349345922 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.482656002 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70493
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.640966892 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:15.966245890 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70493
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.356686115 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:22.681876898 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70500
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.586113930 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:23.910756111 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70501
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:25.046299934 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:25.371048927 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70503
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:35.397089005 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.533524990 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:36.858602047 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70514
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:39.891545057 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:40.217521906 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70518
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.061614990 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.386130095 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70519
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.420818090 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:41.746264935 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70519
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:51.756222010 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.061676025 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:49:58.385910034 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70536
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:08.388902903 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:09.862821102 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:10.187992096 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70548
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:20.191090107 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:30.319475889 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.423152924 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                    Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                    Accept: */*
                                                                                                                                                                                                                                                                                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                    Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.449582100 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:40.747437000 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                                                                                                                    Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                    Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                    Date: Thu, 28 Nov 2024 23:14:22 GMT
                                                                                                                                                                                                                                                                                                                                                    Age: 70578
                                                                                                                                                                                                                                                                                                                                                    Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                    Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                    Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                    Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:50:50.763829947 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:00.892654896 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:
                                                                                                                                                                                                                                                                                                                                                    Nov 29, 2024 19:51:11.022584915 CET6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                    Data Ascii:


                                                                                                                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                                                                                                                    Target ID:0
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:01
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0xed0000
                                                                                                                                                                                                                                                                                                                                                    File size:922'624 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:0C37B6B31773E922A0C8521A372FB1EA
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:1
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:01
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0xd20000
                                                                                                                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:2
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:01
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:3
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:03
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0xd20000
                                                                                                                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:4
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:03
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:5
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:03
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0xd20000
                                                                                                                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:6
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:04
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:7
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:04
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0xd20000
                                                                                                                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:8
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:04
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:9
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:04
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                    Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0xd20000
                                                                                                                                                                                                                                                                                                                                                    File size:74'240 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:10
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:04
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:11
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:04
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:12
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:04
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                                                                                                                    Target ID:13
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:05
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                                                                                                                    Target ID:15
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:07
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73b48725-5781-491b-9a7d-e82bd29e0aa8} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225dd06e910 socket
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                                                                                                                    Target ID:16
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:09
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4120 -parentBuildID 20230927232528 -prefsHandle 4200 -prefMapHandle 4128 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {65482933-8c7a-45cd-9793-b8ba64b693a1} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225ef150610 rdd
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                                                                                                                    Target ID:17
                                                                                                                                                                                                                                                                                                                                                    Start time:13:49:11
                                                                                                                                                                                                                                                                                                                                                    Start date:29/11/2024
                                                                                                                                                                                                                                                                                                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                    Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4832 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 4744 -prefsLen 31144 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b81adb2a-a0a3-424b-b324-c52fcaeb5a69} 7876 "\\.\pipe\gecko-crash-server-pipe.7876" 225eddd2d10 utility
                                                                                                                                                                                                                                                                                                                                                    Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                                                                                                                                    File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                                                                                                                                                                                    Reset < >

                                                                                                                                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                                                                                                                                      Execution Coverage:2.1%
                                                                                                                                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                                                                                                                      Signature Coverage:4.4%
                                                                                                                                                                                                                                                                                                                                                      Total number of Nodes:1548
                                                                                                                                                                                                                                                                                                                                                      Total number of Limit Nodes:65
                                                                                                                                                                                                                                                                                                                                                      execution_graph 95057 ed1cad SystemParametersInfoW 95058 f62a55 95066 f41ebc 95058->95066 95061 f62a70 95068 f339c0 22 API calls 95061->95068 95062 f62a87 95064 f62a7c 95069 f3417d 22 API calls __fread_nolock 95064->95069 95067 f41ec3 IsWindow 95066->95067 95067->95061 95067->95062 95068->95064 95069->95062 95070 f23f75 95081 eeceb1 95070->95081 95072 f23f8b 95074 f24006 95072->95074 95148 eee300 23 API calls 95072->95148 95090 edbf40 95074->95090 95076 f24052 95079 f24a88 95076->95079 95150 f4359c 82 API calls __wsopen_s 95076->95150 95078 f23fe6 95078->95076 95149 f41abf 22 API calls 95078->95149 95082 eecebf 95081->95082 95083 eeced2 95081->95083 95151 edaceb 95082->95151 95085 eeced7 95083->95085 95086 eecf05 95083->95086 95161 eefddb 95085->95161 95088 edaceb 23 API calls 95086->95088 95089 eecec9 95088->95089 95089->95072 95185 edadf0 95090->95185 95092 edbf9d 95093 f204b6 95092->95093 95094 edbfa9 95092->95094 95213 f4359c 82 API calls __wsopen_s 95093->95213 95096 edc01e 95094->95096 95097 f204c6 95094->95097 95190 edac91 95096->95190 95214 f4359c 82 API calls __wsopen_s 95097->95214 95100 edc7da 95202 eefe0b 95100->95202 95106 f204f5 95109 f2055a 95106->95109 95215 eed217 348 API calls 95106->95215 95133 edc603 95109->95133 95216 f4359c 82 API calls __wsopen_s 95109->95216 95110 eefe0b 22 API calls 95144 edc350 __fread_nolock messages 95110->95144 95111 edaf8a 22 API calls 95145 edc039 __fread_nolock messages 95111->95145 95112 f37120 22 API calls 95112->95145 95113 edc808 __fread_nolock 95113->95110 95114 f2091a 95249 f43209 23 API calls 95114->95249 95115 eefddb 22 API calls 95115->95145 95118 edec40 348 API calls 95118->95145 95119 f208a5 95223 edec40 95119->95223 95122 f208cf 95122->95133 95247 eda81b 41 API calls 95122->95247 95123 f20591 95217 f4359c 82 API calls __wsopen_s 95123->95217 95124 f208f6 95248 f4359c 82 API calls __wsopen_s 95124->95248 95129 edbbe0 40 API calls 95129->95145 95130 edaceb 23 API calls 95130->95145 95131 edc237 95132 edc253 95131->95132 95250 eda8c7 22 API calls __fread_nolock 95131->95250 95135 f20976 95132->95135 95140 edc297 messages 95132->95140 95133->95076 95137 edaceb 23 API calls 95135->95137 95138 f209bf 95137->95138 95138->95133 95251 f4359c 82 API calls __wsopen_s 95138->95251 95139 edaceb 23 API calls 95141 edc335 95139->95141 95140->95138 95140->95139 95141->95138 95142 edc342 95141->95142 95201 eda704 22 API calls messages 95142->95201 95147 edc3ac 95144->95147 95212 eece17 22 API calls messages 95144->95212 95145->95100 95145->95106 95145->95109 95145->95111 95145->95112 95145->95113 95145->95114 95145->95115 95145->95118 95145->95119 95145->95123 95145->95124 95145->95129 95145->95130 95145->95131 95145->95133 95145->95138 95146 eefe0b 22 API calls 95145->95146 95194 edad81 95145->95194 95218 f37099 22 API calls __fread_nolock 95145->95218 95219 f55745 54 API calls _wcslen 95145->95219 95220 eeaa42 22 API calls messages 95145->95220 95221 f3f05c 40 API calls 95145->95221 95222 eda993 41 API calls 95145->95222 95146->95145 95147->95076 95148->95078 95149->95074 95150->95079 95152 edacf9 95151->95152 95160 edad2a messages 95151->95160 95153 edad01 messages 95152->95153 95154 edad55 95152->95154 95156 f1fa48 95153->95156 95157 edad21 95153->95157 95153->95160 95154->95160 95171 eda8c7 22 API calls __fread_nolock 95154->95171 95156->95160 95172 eece17 22 API calls messages 95156->95172 95158 f1fa3a VariantClear 95157->95158 95157->95160 95158->95160 95160->95089 95164 eefde0 95161->95164 95163 eefdfa 95163->95089 95164->95163 95166 eefdfc 95164->95166 95173 efea0c 95164->95173 95180 ef4ead 7 API calls 2 library calls 95164->95180 95170 ef066d 95166->95170 95181 ef32a4 RaiseException 95166->95181 95169 ef068a 95169->95089 95182 ef32a4 RaiseException 95170->95182 95171->95160 95172->95160 95178 f03820 __dosmaperr 95173->95178 95174 f0385e 95184 eff2d9 20 API calls __dosmaperr 95174->95184 95175 f03849 RtlAllocateHeap 95177 f0385c 95175->95177 95175->95178 95177->95164 95178->95174 95178->95175 95183 ef4ead 7 API calls 2 library calls 95178->95183 95180->95164 95181->95170 95182->95169 95183->95178 95184->95177 95186 edae01 95185->95186 95189 edae1c messages 95185->95189 95252 edaec9 95186->95252 95188 edae09 CharUpperBuffW 95188->95189 95189->95092 95191 edacae 95190->95191 95192 edacd1 95191->95192 95258 f4359c 82 API calls __wsopen_s 95191->95258 95192->95145 95195 f1fadb 95194->95195 95196 edad92 95194->95196 95197 eefddb 22 API calls 95196->95197 95198 edad99 95197->95198 95259 edadcd 95198->95259 95201->95144 95205 eefddb 95202->95205 95203 efea0c ___std_exception_copy 21 API calls 95203->95205 95204 eefdfa 95204->95113 95205->95203 95205->95204 95208 eefdfc 95205->95208 95272 ef4ead 7 API calls 2 library calls 95205->95272 95207 ef066d 95274 ef32a4 RaiseException 95207->95274 95208->95207 95273 ef32a4 RaiseException 95208->95273 95211 ef068a 95211->95113 95212->95144 95213->95097 95214->95133 95215->95109 95216->95133 95217->95133 95218->95145 95219->95145 95220->95145 95221->95145 95222->95145 95243 edec76 messages 95223->95243 95224 ef0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95224->95243 95225 ef00a3 29 API calls pre_c_initialization 95225->95243 95226 eefddb 22 API calls 95226->95243 95227 edfef7 95240 eded9d messages 95227->95240 95278 eda8c7 22 API calls __fread_nolock 95227->95278 95230 f24b0b 95280 f4359c 82 API calls __wsopen_s 95230->95280 95231 f24600 95231->95240 95277 eda8c7 22 API calls __fread_nolock 95231->95277 95235 eda8c7 22 API calls 95235->95243 95238 edfbe3 95238->95240 95241 f24bdc 95238->95241 95246 edf3ae messages 95238->95246 95239 eda961 22 API calls 95239->95243 95240->95122 95281 f4359c 82 API calls __wsopen_s 95241->95281 95243->95224 95243->95225 95243->95226 95243->95227 95243->95230 95243->95231 95243->95235 95243->95238 95243->95239 95243->95240 95244 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95243->95244 95245 f24beb 95243->95245 95243->95246 95275 ee01e0 348 API calls 2 library calls 95243->95275 95276 ee06a0 41 API calls messages 95243->95276 95244->95243 95282 f4359c 82 API calls __wsopen_s 95245->95282 95246->95240 95279 f4359c 82 API calls __wsopen_s 95246->95279 95247->95124 95248->95133 95249->95131 95250->95132 95251->95133 95253 edaedc 95252->95253 95254 edaed9 __fread_nolock 95252->95254 95255 eefddb 22 API calls 95253->95255 95254->95188 95256 edaee7 95255->95256 95257 eefe0b 22 API calls 95256->95257 95257->95254 95258->95192 95263 edaddd 95259->95263 95260 edadb6 95260->95145 95261 eefddb 22 API calls 95261->95263 95263->95260 95263->95261 95265 edadcd 22 API calls 95263->95265 95266 eda961 95263->95266 95271 eda8c7 22 API calls __fread_nolock 95263->95271 95265->95263 95267 eefe0b 22 API calls 95266->95267 95268 eda976 95267->95268 95269 eefddb 22 API calls 95268->95269 95270 eda984 95269->95270 95270->95263 95271->95263 95272->95205 95273->95207 95274->95211 95275->95243 95276->95243 95277->95240 95278->95240 95279->95240 95280->95240 95281->95245 95282->95240 95283 ed1044 95288 ed10f3 95283->95288 95285 ed104a 95324 ef00a3 29 API calls __onexit 95285->95324 95287 ed1054 95325 ed1398 95288->95325 95292 ed116a 95293 eda961 22 API calls 95292->95293 95294 ed1174 95293->95294 95295 eda961 22 API calls 95294->95295 95296 ed117e 95295->95296 95297 eda961 22 API calls 95296->95297 95298 ed1188 95297->95298 95299 eda961 22 API calls 95298->95299 95300 ed11c6 95299->95300 95301 eda961 22 API calls 95300->95301 95302 ed1292 95301->95302 95335 ed171c 95302->95335 95306 ed12c4 95307 eda961 22 API calls 95306->95307 95308 ed12ce 95307->95308 95356 ee1940 95308->95356 95310 ed12f9 95366 ed1aab 95310->95366 95312 ed1315 95313 ed1325 GetStdHandle 95312->95313 95314 f12485 95313->95314 95315 ed137a 95313->95315 95314->95315 95316 f1248e 95314->95316 95318 ed1387 OleInitialize 95315->95318 95317 eefddb 22 API calls 95316->95317 95319 f12495 95317->95319 95318->95285 95373 f4011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95319->95373 95321 f1249e 95374 f40944 CreateThread 95321->95374 95323 f124aa CloseHandle 95323->95315 95324->95287 95375 ed13f1 95325->95375 95328 ed13f1 22 API calls 95329 ed13d0 95328->95329 95330 eda961 22 API calls 95329->95330 95331 ed13dc 95330->95331 95382 ed6b57 95331->95382 95333 ed1129 95334 ed1bc3 6 API calls 95333->95334 95334->95292 95336 eda961 22 API calls 95335->95336 95337 ed172c 95336->95337 95338 eda961 22 API calls 95337->95338 95339 ed1734 95338->95339 95340 eda961 22 API calls 95339->95340 95341 ed174f 95340->95341 95342 eefddb 22 API calls 95341->95342 95343 ed129c 95342->95343 95344 ed1b4a 95343->95344 95345 ed1b58 95344->95345 95346 eda961 22 API calls 95345->95346 95347 ed1b63 95346->95347 95348 eda961 22 API calls 95347->95348 95349 ed1b6e 95348->95349 95350 eda961 22 API calls 95349->95350 95351 ed1b79 95350->95351 95352 eda961 22 API calls 95351->95352 95353 ed1b84 95352->95353 95354 eefddb 22 API calls 95353->95354 95355 ed1b96 RegisterWindowMessageW 95354->95355 95355->95306 95357 ee1981 95356->95357 95360 ee195d 95356->95360 95399 ef0242 5 API calls __Init_thread_wait 95357->95399 95359 ee196e 95359->95310 95360->95359 95401 ef0242 5 API calls __Init_thread_wait 95360->95401 95361 ee198b 95361->95360 95400 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95361->95400 95363 ee8727 95363->95359 95402 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95363->95402 95367 ed1abb 95366->95367 95368 f1272d 95366->95368 95370 eefddb 22 API calls 95367->95370 95403 f43209 23 API calls 95368->95403 95371 ed1ac3 95370->95371 95371->95312 95372 f12738 95373->95321 95374->95323 95404 f4092a 28 API calls 95374->95404 95376 eda961 22 API calls 95375->95376 95377 ed13fc 95376->95377 95378 eda961 22 API calls 95377->95378 95379 ed1404 95378->95379 95380 eda961 22 API calls 95379->95380 95381 ed13c6 95380->95381 95381->95328 95383 f14ba1 95382->95383 95384 ed6b67 _wcslen 95382->95384 95395 ed93b2 95383->95395 95387 ed6b7d 95384->95387 95388 ed6ba2 95384->95388 95386 f14baa 95386->95386 95394 ed6f34 22 API calls 95387->95394 95389 eefddb 22 API calls 95388->95389 95391 ed6bae 95389->95391 95392 eefe0b 22 API calls 95391->95392 95393 ed6b85 __fread_nolock 95392->95393 95393->95333 95394->95393 95396 ed93c0 95395->95396 95397 ed93c9 __fread_nolock 95395->95397 95396->95397 95398 edaec9 22 API calls 95396->95398 95397->95386 95397->95397 95398->95397 95399->95361 95400->95360 95401->95363 95402->95359 95403->95372 95405 ed2de3 95406 ed2df0 __wsopen_s 95405->95406 95407 ed2e09 95406->95407 95408 f12c2b ___scrt_fastfail 95406->95408 95421 ed3aa2 95407->95421 95411 f12c47 GetOpenFileNameW 95408->95411 95413 f12c96 95411->95413 95415 ed6b57 22 API calls 95413->95415 95417 f12cab 95415->95417 95417->95417 95418 ed2e27 95449 ed44a8 95418->95449 95478 f11f50 95421->95478 95424 ed3ace 95426 ed6b57 22 API calls 95424->95426 95425 ed3ae9 95484 eda6c3 95425->95484 95428 ed3ada 95426->95428 95480 ed37a0 95428->95480 95431 ed2da5 95432 f11f50 __wsopen_s 95431->95432 95433 ed2db2 GetLongPathNameW 95432->95433 95434 ed6b57 22 API calls 95433->95434 95435 ed2dda 95434->95435 95436 ed3598 95435->95436 95437 eda961 22 API calls 95436->95437 95438 ed35aa 95437->95438 95439 ed3aa2 23 API calls 95438->95439 95440 ed35b5 95439->95440 95441 f132eb 95440->95441 95442 ed35c0 95440->95442 95446 f1330d 95441->95446 95502 eece60 41 API calls 95441->95502 95490 ed515f 95442->95490 95448 ed35df 95448->95418 95503 ed4ecb 95449->95503 95452 f13833 95525 f42cf9 95452->95525 95454 ed4ecb 94 API calls 95456 ed44e1 95454->95456 95455 f13848 95457 f13869 95455->95457 95458 f1384c 95455->95458 95456->95452 95459 ed44e9 95456->95459 95461 eefe0b 22 API calls 95457->95461 95552 ed4f39 95458->95552 95462 f13854 95459->95462 95463 ed44f5 95459->95463 95477 f138ae 95461->95477 95558 f3da5a 82 API calls 95462->95558 95551 ed940c 136 API calls 2 library calls 95463->95551 95466 f13862 95466->95457 95467 ed2e31 95468 ed4f39 68 API calls 95471 f13a5f 95468->95471 95471->95468 95564 f3989b 82 API calls __wsopen_s 95471->95564 95474 ed9cb3 22 API calls 95474->95477 95477->95471 95477->95474 95559 f3967e 22 API calls __fread_nolock 95477->95559 95560 f395ad 42 API calls _wcslen 95477->95560 95561 f40b5a 22 API calls 95477->95561 95562 eda4a1 22 API calls __fread_nolock 95477->95562 95563 ed3ff7 22 API calls 95477->95563 95479 ed3aaf GetFullPathNameW 95478->95479 95479->95424 95479->95425 95481 ed37ae 95480->95481 95482 ed93b2 22 API calls 95481->95482 95483 ed2e12 95482->95483 95483->95431 95485 eda6dd 95484->95485 95486 eda6d0 95484->95486 95487 eefddb 22 API calls 95485->95487 95486->95428 95488 eda6e7 95487->95488 95489 eefe0b 22 API calls 95488->95489 95489->95486 95491 ed516e 95490->95491 95495 ed518f __fread_nolock 95490->95495 95494 eefe0b 22 API calls 95491->95494 95492 eefddb 22 API calls 95493 ed35cc 95492->95493 95496 ed35f3 95493->95496 95494->95495 95495->95492 95497 ed3605 95496->95497 95501 ed3624 __fread_nolock 95496->95501 95499 eefe0b 22 API calls 95497->95499 95498 eefddb 22 API calls 95500 ed363b 95498->95500 95499->95501 95500->95448 95501->95498 95502->95441 95565 ed4e90 LoadLibraryA 95503->95565 95508 ed4ef6 LoadLibraryExW 95573 ed4e59 LoadLibraryA 95508->95573 95509 f13ccf 95511 ed4f39 68 API calls 95509->95511 95513 f13cd6 95511->95513 95515 ed4e59 3 API calls 95513->95515 95517 f13cde 95515->95517 95516 ed4f20 95516->95517 95518 ed4f2c 95516->95518 95595 ed50f5 95517->95595 95519 ed4f39 68 API calls 95518->95519 95521 ed44cd 95519->95521 95521->95452 95521->95454 95524 f13d05 95526 f42d15 95525->95526 95527 ed511f 64 API calls 95526->95527 95528 f42d29 95527->95528 95745 f42e66 95528->95745 95531 ed50f5 40 API calls 95532 f42d56 95531->95532 95533 ed50f5 40 API calls 95532->95533 95534 f42d66 95533->95534 95535 ed50f5 40 API calls 95534->95535 95536 f42d81 95535->95536 95537 ed50f5 40 API calls 95536->95537 95538 f42d9c 95537->95538 95539 ed511f 64 API calls 95538->95539 95540 f42db3 95539->95540 95541 efea0c ___std_exception_copy 21 API calls 95540->95541 95542 f42dba 95541->95542 95543 efea0c ___std_exception_copy 21 API calls 95542->95543 95544 f42dc4 95543->95544 95545 ed50f5 40 API calls 95544->95545 95546 f42dd8 95545->95546 95547 f428fe 27 API calls 95546->95547 95549 f42dee 95547->95549 95548 f42d3f 95548->95455 95549->95548 95751 f422ce 79 API calls 95549->95751 95551->95467 95553 ed4f4a 95552->95553 95554 ed4f43 95552->95554 95556 ed4f59 95553->95556 95557 ed4f6a FreeLibrary 95553->95557 95752 efe678 95554->95752 95556->95462 95557->95556 95558->95466 95559->95477 95560->95477 95561->95477 95562->95477 95563->95477 95564->95471 95566 ed4ea8 GetProcAddress 95565->95566 95567 ed4ec6 95565->95567 95568 ed4eb8 95566->95568 95570 efe5eb 95567->95570 95568->95567 95569 ed4ebf FreeLibrary 95568->95569 95569->95567 95603 efe52a 95570->95603 95572 ed4eea 95572->95508 95572->95509 95574 ed4e8d 95573->95574 95575 ed4e6e GetProcAddress 95573->95575 95578 ed4f80 95574->95578 95576 ed4e7e 95575->95576 95576->95574 95577 ed4e86 FreeLibrary 95576->95577 95577->95574 95579 eefe0b 22 API calls 95578->95579 95580 ed4f95 95579->95580 95671 ed5722 95580->95671 95582 ed4fa1 __fread_nolock 95583 ed50a5 95582->95583 95584 f13d1d 95582->95584 95594 ed4fdc 95582->95594 95674 ed42a2 CreateStreamOnHGlobal 95583->95674 95685 f4304d 74 API calls 95584->95685 95587 f13d22 95589 ed511f 64 API calls 95587->95589 95588 ed50f5 40 API calls 95588->95594 95590 f13d45 95589->95590 95591 ed50f5 40 API calls 95590->95591 95592 ed506e messages 95591->95592 95592->95516 95594->95587 95594->95588 95594->95592 95680 ed511f 95594->95680 95596 ed5107 95595->95596 95599 f13d70 95595->95599 95707 efe8c4 95596->95707 95600 f428fe 95728 f4274e 95600->95728 95602 f42919 95602->95524 95606 efe536 BuildCatchObjectHelperInternal 95603->95606 95604 efe544 95628 eff2d9 20 API calls __dosmaperr 95604->95628 95606->95604 95608 efe574 95606->95608 95607 efe549 95629 f027ec 26 API calls pre_c_initialization 95607->95629 95610 efe579 95608->95610 95611 efe586 95608->95611 95630 eff2d9 20 API calls __dosmaperr 95610->95630 95620 f08061 95611->95620 95614 efe554 __fread_nolock 95614->95572 95615 efe58f 95616 efe595 95615->95616 95617 efe5a2 95615->95617 95631 eff2d9 20 API calls __dosmaperr 95616->95631 95632 efe5d4 LeaveCriticalSection __fread_nolock 95617->95632 95621 f0806d BuildCatchObjectHelperInternal 95620->95621 95633 f02f5e EnterCriticalSection 95621->95633 95623 f0807b 95634 f080fb 95623->95634 95627 f080ac __fread_nolock 95627->95615 95628->95607 95629->95614 95630->95614 95631->95614 95632->95614 95633->95623 95640 f0811e 95634->95640 95635 f08177 95652 f04c7d 95635->95652 95640->95635 95640->95640 95643 f08088 95640->95643 95650 ef918d EnterCriticalSection 95640->95650 95651 ef91a1 LeaveCriticalSection 95640->95651 95641 f08189 95641->95643 95665 f03405 11 API calls 2 library calls 95641->95665 95647 f080b7 95643->95647 95644 f081a8 95666 ef918d EnterCriticalSection 95644->95666 95670 f02fa6 LeaveCriticalSection 95647->95670 95649 f080be 95649->95627 95650->95640 95651->95640 95657 f04c8a __dosmaperr 95652->95657 95653 f04cca 95668 eff2d9 20 API calls __dosmaperr 95653->95668 95654 f04cb5 RtlAllocateHeap 95655 f04cc8 95654->95655 95654->95657 95659 f029c8 95655->95659 95657->95653 95657->95654 95667 ef4ead 7 API calls 2 library calls 95657->95667 95660 f029d3 RtlFreeHeap 95659->95660 95664 f029fc _free 95659->95664 95661 f029e8 95660->95661 95660->95664 95669 eff2d9 20 API calls __dosmaperr 95661->95669 95663 f029ee GetLastError 95663->95664 95664->95641 95665->95644 95666->95643 95667->95657 95668->95655 95669->95663 95670->95649 95672 eefddb 22 API calls 95671->95672 95673 ed5734 95672->95673 95673->95582 95675 ed42bc FindResourceExW 95674->95675 95679 ed42d9 95674->95679 95676 f135ba LoadResource 95675->95676 95675->95679 95677 f135cf SizeofResource 95676->95677 95676->95679 95678 f135e3 LockResource 95677->95678 95677->95679 95678->95679 95679->95594 95681 f13d90 95680->95681 95682 ed512e 95680->95682 95686 efece3 95682->95686 95685->95587 95689 efeaaa 95686->95689 95688 ed513c 95688->95594 95691 efeab6 BuildCatchObjectHelperInternal 95689->95691 95690 efeac2 95702 eff2d9 20 API calls __dosmaperr 95690->95702 95691->95690 95692 efeae8 95691->95692 95704 ef918d EnterCriticalSection 95692->95704 95695 efeac7 95703 f027ec 26 API calls pre_c_initialization 95695->95703 95697 efeaf4 95705 efec0a 62 API calls 2 library calls 95697->95705 95699 efeb08 95706 efeb27 LeaveCriticalSection __fread_nolock 95699->95706 95701 efead2 __fread_nolock 95701->95688 95702->95695 95703->95701 95704->95697 95705->95699 95706->95701 95710 efe8e1 95707->95710 95709 ed5118 95709->95600 95711 efe8ed BuildCatchObjectHelperInternal 95710->95711 95712 efe92d 95711->95712 95713 efe900 ___scrt_fastfail 95711->95713 95714 efe925 __fread_nolock 95711->95714 95725 ef918d EnterCriticalSection 95712->95725 95723 eff2d9 20 API calls __dosmaperr 95713->95723 95714->95709 95717 efe937 95726 efe6f8 38 API calls 4 library calls 95717->95726 95718 efe91a 95724 f027ec 26 API calls pre_c_initialization 95718->95724 95721 efe94e 95727 efe96c LeaveCriticalSection __fread_nolock 95721->95727 95723->95718 95724->95714 95725->95717 95726->95721 95727->95714 95731 efe4e8 95728->95731 95730 f4275d 95730->95602 95734 efe469 95731->95734 95733 efe505 95733->95730 95735 efe48c 95734->95735 95736 efe478 95734->95736 95741 efe488 __alldvrm 95735->95741 95744 f0333f 11 API calls 2 library calls 95735->95744 95742 eff2d9 20 API calls __dosmaperr 95736->95742 95738 efe47d 95743 f027ec 26 API calls pre_c_initialization 95738->95743 95741->95733 95742->95738 95743->95741 95744->95741 95747 f42e7a 95745->95747 95746 f428fe 27 API calls 95746->95747 95747->95746 95748 ed50f5 40 API calls 95747->95748 95749 f42d3b 95747->95749 95750 ed511f 64 API calls 95747->95750 95748->95747 95749->95531 95749->95548 95750->95747 95751->95548 95753 efe684 BuildCatchObjectHelperInternal 95752->95753 95754 efe6aa 95753->95754 95755 efe695 95753->95755 95757 efe6a5 __fread_nolock 95754->95757 95767 ef918d EnterCriticalSection 95754->95767 95765 eff2d9 20 API calls __dosmaperr 95755->95765 95757->95553 95758 efe69a 95766 f027ec 26 API calls pre_c_initialization 95758->95766 95761 efe6c6 95768 efe602 95761->95768 95763 efe6d1 95784 efe6ee LeaveCriticalSection __fread_nolock 95763->95784 95765->95758 95766->95757 95767->95761 95769 efe60f 95768->95769 95770 efe624 95768->95770 95785 eff2d9 20 API calls __dosmaperr 95769->95785 95776 efe61f 95770->95776 95787 efdc0b 95770->95787 95772 efe614 95786 f027ec 26 API calls pre_c_initialization 95772->95786 95776->95763 95780 efe646 95804 f0862f 95780->95804 95783 f029c8 _free 20 API calls 95783->95776 95784->95757 95785->95772 95786->95776 95788 efdc1f 95787->95788 95789 efdc23 95787->95789 95793 f04d7a 95788->95793 95789->95788 95790 efd955 __fread_nolock 26 API calls 95789->95790 95791 efdc43 95790->95791 95819 f059be 62 API calls 6 library calls 95791->95819 95794 f04d90 95793->95794 95796 efe640 95793->95796 95795 f029c8 _free 20 API calls 95794->95795 95794->95796 95795->95796 95797 efd955 95796->95797 95798 efd976 95797->95798 95799 efd961 95797->95799 95798->95780 95820 eff2d9 20 API calls __dosmaperr 95799->95820 95801 efd966 95821 f027ec 26 API calls pre_c_initialization 95801->95821 95803 efd971 95803->95780 95805 f08653 95804->95805 95806 f0863e 95804->95806 95808 f0868e 95805->95808 95813 f0867a 95805->95813 95822 eff2c6 20 API calls __dosmaperr 95806->95822 95827 eff2c6 20 API calls __dosmaperr 95808->95827 95809 f08643 95823 eff2d9 20 API calls __dosmaperr 95809->95823 95811 f08693 95828 eff2d9 20 API calls __dosmaperr 95811->95828 95824 f08607 95813->95824 95816 f0869b 95829 f027ec 26 API calls pre_c_initialization 95816->95829 95817 efe64c 95817->95776 95817->95783 95819->95788 95820->95801 95821->95803 95822->95809 95823->95817 95830 f08585 95824->95830 95826 f0862b 95826->95817 95827->95811 95828->95816 95829->95817 95831 f08591 BuildCatchObjectHelperInternal 95830->95831 95841 f05147 EnterCriticalSection 95831->95841 95833 f0859f 95834 f085d1 95833->95834 95835 f085c6 95833->95835 95857 eff2d9 20 API calls __dosmaperr 95834->95857 95842 f086ae 95835->95842 95838 f085cc 95858 f085fb LeaveCriticalSection __wsopen_s 95838->95858 95840 f085ee __fread_nolock 95840->95826 95841->95833 95859 f053c4 95842->95859 95844 f086c4 95872 f05333 21 API calls 3 library calls 95844->95872 95846 f086be 95846->95844 95847 f086f6 95846->95847 95850 f053c4 __wsopen_s 26 API calls 95846->95850 95847->95844 95848 f053c4 __wsopen_s 26 API calls 95847->95848 95851 f08702 CloseHandle 95848->95851 95849 f0871c 95852 f0873e 95849->95852 95873 eff2a3 20 API calls 2 library calls 95849->95873 95853 f086ed 95850->95853 95851->95844 95854 f0870e GetLastError 95851->95854 95852->95838 95856 f053c4 __wsopen_s 26 API calls 95853->95856 95854->95844 95856->95847 95857->95838 95858->95840 95860 f053d1 95859->95860 95861 f053e6 95859->95861 95874 eff2c6 20 API calls __dosmaperr 95860->95874 95865 f0540b 95861->95865 95876 eff2c6 20 API calls __dosmaperr 95861->95876 95864 f053d6 95875 eff2d9 20 API calls __dosmaperr 95864->95875 95865->95846 95866 f05416 95877 eff2d9 20 API calls __dosmaperr 95866->95877 95869 f053de 95869->95846 95870 f0541e 95878 f027ec 26 API calls pre_c_initialization 95870->95878 95872->95849 95873->95852 95874->95864 95875->95869 95876->95866 95877->95870 95878->95869 95879 eddefc 95882 ed1d6f 95879->95882 95881 eddf07 95883 ed1d8c 95882->95883 95891 ed1f6f 95883->95891 95885 ed1da6 95886 f12759 95885->95886 95888 ed1e36 95885->95888 95889 ed1dc2 95885->95889 95895 f4359c 82 API calls __wsopen_s 95886->95895 95888->95881 95889->95888 95894 ed289a 23 API calls 95889->95894 95892 edec40 348 API calls 95891->95892 95893 ed1f98 95892->95893 95893->95885 95894->95888 95895->95888 95896 f22a00 95911 edd7b0 messages 95896->95911 95897 eddb11 PeekMessageW 95897->95911 95898 edd807 GetInputState 95898->95897 95898->95911 95900 f21cbe TranslateAcceleratorW 95900->95911 95901 edda04 timeGetTime 95901->95911 95902 eddb8f PeekMessageW 95902->95911 95903 eddb73 TranslateMessage DispatchMessageW 95903->95902 95904 eddbaf Sleep 95904->95911 95905 f22b74 Sleep 95917 f22a51 95905->95917 95908 f21dda timeGetTime 95997 eee300 23 API calls 95908->95997 95911->95897 95911->95898 95911->95900 95911->95901 95911->95902 95911->95903 95911->95904 95911->95905 95911->95908 95911->95917 95918 edd9d5 95911->95918 95924 edec40 348 API calls 95911->95924 95926 edbf40 348 API calls 95911->95926 95928 eddd50 95911->95928 95935 ee1310 95911->95935 95990 eeedf6 95911->95990 95995 eddfd0 348 API calls 3 library calls 95911->95995 95996 eee551 timeGetTime 95911->95996 95998 f43a2a 23 API calls 95911->95998 95999 f4359c 82 API calls __wsopen_s 95911->95999 95912 f22c0b GetExitCodeProcess 95915 f22c21 WaitForSingleObject 95912->95915 95916 f22c37 CloseHandle 95912->95916 95913 f629bf GetForegroundWindow 95913->95917 95915->95911 95915->95916 95916->95917 95917->95911 95917->95912 95917->95913 95917->95918 95919 f22ca9 Sleep 95917->95919 96000 f55658 23 API calls 95917->96000 96001 f3e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95917->96001 96002 eee551 timeGetTime 95917->96002 96003 f3d4dc CreateToolhelp32Snapshot Process32FirstW 95917->96003 95919->95911 95924->95911 95926->95911 95929 eddd6f 95928->95929 95930 eddd83 95928->95930 96013 edd260 95929->96013 96045 f4359c 82 API calls __wsopen_s 95930->96045 95932 eddd7a 95932->95911 95934 f22f75 95934->95934 95936 ee1376 95935->95936 95937 ee17b0 95935->95937 95939 f26331 95936->95939 95940 ee1390 95936->95940 96081 ef0242 5 API calls __Init_thread_wait 95937->96081 95941 f2633d 95939->95941 96091 f5709c 348 API calls 95939->96091 95944 ee1940 9 API calls 95940->95944 95941->95911 95943 ee17ba 95945 ee17fb 95943->95945 96082 ed9cb3 95943->96082 95946 ee13a0 95944->95946 95950 f26346 95945->95950 95952 ee182c 95945->95952 95947 ee1940 9 API calls 95946->95947 95949 ee13b6 95947->95949 95949->95945 95951 ee13ec 95949->95951 96092 f4359c 82 API calls __wsopen_s 95950->96092 95951->95950 95975 ee1408 __fread_nolock 95951->95975 95953 edaceb 23 API calls 95952->95953 95955 ee1839 95953->95955 96089 eed217 348 API calls 95955->96089 95956 ee17d4 96088 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95956->96088 95959 f2636e 96093 f4359c 82 API calls __wsopen_s 95959->96093 95960 ee152f 95962 ee153c 95960->95962 95963 f263d1 95960->95963 95965 ee1940 9 API calls 95962->95965 96095 f55745 54 API calls _wcslen 95963->96095 95966 ee1549 95965->95966 95970 ee1940 9 API calls 95966->95970 95974 ee15c7 messages 95966->95974 95967 eefddb 22 API calls 95967->95975 95968 eefe0b 22 API calls 95968->95975 95969 ee1872 96090 eefaeb 23 API calls 95969->96090 95978 ee1563 95970->95978 95971 ee171d 95971->95911 95974->95969 95976 ee167b messages 95974->95976 95979 ee1940 9 API calls 95974->95979 96052 f5ab67 95974->96052 96055 f5a2ea 95974->96055 96060 f5abf7 95974->96060 96065 eef645 95974->96065 96072 f61591 95974->96072 96075 f45c5a 95974->96075 96097 f4359c 82 API calls __wsopen_s 95974->96097 95975->95955 95975->95959 95975->95960 95975->95967 95975->95968 95975->95974 95977 edec40 348 API calls 95975->95977 95980 f263b2 95975->95980 95976->95971 96080 eece17 22 API calls messages 95976->96080 95977->95975 95978->95974 96096 eda8c7 22 API calls __fread_nolock 95978->96096 95979->95974 96094 f4359c 82 API calls __wsopen_s 95980->96094 95991 eeee09 95990->95991 95993 eeee12 95990->95993 95991->95911 95992 eeee36 IsDialogMessageW 95992->95991 95992->95993 95993->95991 95993->95992 95994 f2efaf GetClassLongW 95993->95994 95994->95992 95994->95993 95995->95911 95996->95911 95997->95911 95998->95911 95999->95911 96000->95917 96001->95917 96002->95917 96269 f3def7 96003->96269 96005 f3d5db CloseHandle 96005->95917 96006 f3d529 Process32NextW 96006->96005 96007 f3d522 96006->96007 96007->96005 96007->96006 96008 eda961 22 API calls 96007->96008 96009 ed9cb3 22 API calls 96007->96009 96275 ed525f 22 API calls 96007->96275 96276 ed6350 22 API calls 96007->96276 96277 eece60 41 API calls 96007->96277 96008->96007 96009->96007 96014 edec40 348 API calls 96013->96014 96034 edd29d 96014->96034 96015 f21bc4 96051 f4359c 82 API calls __wsopen_s 96015->96051 96017 edd6d5 96019 edd30b messages 96017->96019 96028 eefe0b 22 API calls 96017->96028 96018 edd3c3 96018->96017 96021 edd3ce 96018->96021 96019->95932 96020 edd5ff 96022 f21bb5 96020->96022 96023 edd614 96020->96023 96025 eefddb 22 API calls 96021->96025 96050 f55705 23 API calls 96022->96050 96027 eefddb 22 API calls 96023->96027 96024 edd4b8 96029 eefe0b 22 API calls 96024->96029 96032 edd3d5 __fread_nolock 96025->96032 96037 edd46a 96027->96037 96028->96032 96040 edd429 __fread_nolock messages 96029->96040 96030 eefddb 22 API calls 96031 edd3f6 96030->96031 96031->96040 96046 edbec0 348 API calls 96031->96046 96032->96030 96032->96031 96033 eefddb 22 API calls 96033->96034 96034->96015 96034->96017 96034->96018 96034->96019 96034->96024 96034->96033 96034->96040 96036 f21ba4 96049 f4359c 82 API calls __wsopen_s 96036->96049 96037->95932 96039 ed1f6f 348 API calls 96039->96040 96040->96020 96040->96036 96040->96037 96040->96039 96041 f21b7f 96040->96041 96043 f21b5d 96040->96043 96048 f4359c 82 API calls __wsopen_s 96041->96048 96047 f4359c 82 API calls __wsopen_s 96043->96047 96045->95934 96046->96040 96047->96037 96048->96037 96049->96037 96050->96015 96051->96019 96098 f5aff9 96052->96098 96056 ed7510 53 API calls 96055->96056 96057 f5a306 96056->96057 96058 f3d4dc 47 API calls 96057->96058 96059 f5a315 96058->96059 96059->95974 96061 f5aff9 217 API calls 96060->96061 96063 f5ac0c 96061->96063 96062 f5ac54 96062->95974 96063->96062 96064 edaceb 23 API calls 96063->96064 96064->96062 96066 edb567 39 API calls 96065->96066 96067 eef659 96066->96067 96068 f2f2dc Sleep 96067->96068 96069 eef661 timeGetTime 96067->96069 96070 edb567 39 API calls 96069->96070 96071 eef677 96070->96071 96071->95974 96253 f62ad8 96072->96253 96074 f6159f 96074->95974 96076 ed7510 53 API calls 96075->96076 96077 f45c6d 96076->96077 96264 f3dbbe lstrlenW 96077->96264 96079 f45c77 96079->95974 96080->95976 96081->95943 96083 ed9cc2 _wcslen 96082->96083 96084 eefe0b 22 API calls 96083->96084 96085 ed9cea __fread_nolock 96084->96085 96086 eefddb 22 API calls 96085->96086 96087 ed9d00 96086->96087 96087->95956 96088->95945 96089->95969 96090->95969 96091->95941 96092->95974 96093->95974 96094->95974 96095->95978 96096->95974 96097->95974 96099 f5b01d ___scrt_fastfail 96098->96099 96100 f5b094 96099->96100 96101 f5b058 96099->96101 96105 edb567 39 API calls 96100->96105 96106 f5b08b 96100->96106 96219 edb567 96101->96219 96103 f5b063 96103->96106 96109 edb567 39 API calls 96103->96109 96104 f5b0ed 96189 ed7510 96104->96189 96108 f5b0a5 96105->96108 96106->96104 96110 edb567 39 API calls 96106->96110 96112 edb567 39 API calls 96108->96112 96113 f5b078 96109->96113 96110->96104 96112->96106 96116 edb567 39 API calls 96113->96116 96115 f5b115 96117 f5b11f 96115->96117 96118 f5b1d8 96115->96118 96116->96106 96119 ed7510 53 API calls 96117->96119 96120 f5b20a GetCurrentDirectoryW 96118->96120 96123 ed7510 53 API calls 96118->96123 96121 f5b130 96119->96121 96122 eefe0b 22 API calls 96120->96122 96124 ed7620 22 API calls 96121->96124 96125 f5b22f GetCurrentDirectoryW 96122->96125 96126 f5b1ef 96123->96126 96127 f5b13a 96124->96127 96128 f5b23c 96125->96128 96129 ed7620 22 API calls 96126->96129 96130 ed7510 53 API calls 96127->96130 96133 f5b275 96128->96133 96224 ed9c6e 22 API calls 96128->96224 96131 f5b1f9 _wcslen 96129->96131 96132 f5b14b 96130->96132 96131->96120 96131->96133 96134 ed7620 22 API calls 96132->96134 96138 f5b287 96133->96138 96139 f5b28b 96133->96139 96136 f5b155 96134->96136 96140 ed7510 53 API calls 96136->96140 96137 f5b255 96225 ed9c6e 22 API calls 96137->96225 96146 f5b2f8 96138->96146 96147 f5b39a CreateProcessW 96138->96147 96227 f407c0 10 API calls 96139->96227 96143 f5b166 96140->96143 96148 ed7620 22 API calls 96143->96148 96144 f5b265 96226 ed9c6e 22 API calls 96144->96226 96145 f5b294 96228 f406e6 10 API calls 96145->96228 96230 f311c8 39 API calls 96146->96230 96188 f5b32f _wcslen 96147->96188 96152 f5b170 96148->96152 96155 f5b1a6 GetSystemDirectoryW 96152->96155 96160 ed7510 53 API calls 96152->96160 96153 f5b2aa 96229 f405a7 8 API calls 96153->96229 96154 f5b2fd 96158 f5b323 96154->96158 96159 f5b32a 96154->96159 96157 eefe0b 22 API calls 96155->96157 96164 f5b1cb GetSystemDirectoryW 96157->96164 96231 f31201 128 API calls 2 library calls 96158->96231 96232 f314ce 6 API calls 96159->96232 96161 f5b187 96160->96161 96166 ed7620 22 API calls 96161->96166 96163 f5b2d0 96163->96138 96164->96128 96168 f5b191 _wcslen 96166->96168 96167 f5b328 96167->96188 96168->96128 96168->96155 96169 f5b3d6 GetLastError 96178 f5b41a 96169->96178 96170 f5b42f CloseHandle 96171 f5b43f 96170->96171 96179 f5b49a 96170->96179 96172 f5b446 CloseHandle 96171->96172 96173 f5b451 96171->96173 96172->96173 96176 f5b463 96173->96176 96177 f5b458 CloseHandle 96173->96177 96175 f5b4a6 96175->96178 96180 f5b475 96176->96180 96181 f5b46a CloseHandle 96176->96181 96177->96176 96216 f40175 96178->96216 96179->96175 96184 f5b4d2 CloseHandle 96179->96184 96233 f409d9 34 API calls 96180->96233 96181->96180 96184->96178 96186 f5b486 96234 f5b536 25 API calls 96186->96234 96188->96169 96188->96170 96190 ed7525 96189->96190 96205 ed7522 96189->96205 96191 ed752d 96190->96191 96192 ed755b 96190->96192 96235 ef51c6 26 API calls 96191->96235 96194 ed756d 96192->96194 96201 f150f6 96192->96201 96203 f1500f 96192->96203 96236 eefb21 51 API calls 96194->96236 96197 ed753d 96200 eefddb 22 API calls 96197->96200 96198 f1510e 96198->96198 96202 ed7547 96200->96202 96238 ef5183 26 API calls 96201->96238 96204 ed9cb3 22 API calls 96202->96204 96206 eefe0b 22 API calls 96203->96206 96211 f15088 96203->96211 96204->96205 96212 ed7620 96205->96212 96207 f15058 96206->96207 96208 eefddb 22 API calls 96207->96208 96209 f1507f 96208->96209 96210 ed9cb3 22 API calls 96209->96210 96210->96211 96237 eefb21 51 API calls 96211->96237 96213 ed762a _wcslen 96212->96213 96214 eefe0b 22 API calls 96213->96214 96215 ed763f 96214->96215 96215->96115 96239 f4030f 96216->96239 96220 edb578 96219->96220 96221 edb57f 96219->96221 96220->96221 96252 ef62d1 39 API calls 96220->96252 96221->96103 96223 edb5c2 96223->96103 96224->96137 96225->96144 96226->96133 96227->96145 96228->96153 96229->96163 96230->96154 96231->96167 96232->96188 96233->96186 96234->96179 96235->96197 96236->96197 96237->96201 96238->96198 96240 f40321 CloseHandle 96239->96240 96241 f40329 96239->96241 96240->96241 96242 f40336 96241->96242 96243 f4032e CloseHandle 96241->96243 96244 f40343 96242->96244 96245 f4033b CloseHandle 96242->96245 96243->96242 96246 f40350 96244->96246 96247 f40348 CloseHandle 96244->96247 96245->96244 96248 f40355 CloseHandle 96246->96248 96249 f4035d 96246->96249 96247->96246 96248->96249 96250 f40362 CloseHandle 96249->96250 96251 f4017d 96249->96251 96250->96251 96251->95974 96252->96223 96254 edaceb 23 API calls 96253->96254 96255 f62af3 96254->96255 96256 f62aff 96255->96256 96257 f62b1d 96255->96257 96258 ed7510 53 API calls 96256->96258 96259 ed6b57 22 API calls 96257->96259 96260 f62b0c 96258->96260 96262 f62b1b 96259->96262 96260->96262 96263 eda8c7 22 API calls __fread_nolock 96260->96263 96262->96074 96263->96262 96265 f3dc06 96264->96265 96266 f3dbdc GetFileAttributesW 96264->96266 96265->96079 96266->96265 96267 f3dbe8 FindFirstFileW 96266->96267 96267->96265 96268 f3dbf9 FindClose 96267->96268 96268->96265 96270 f3df02 96269->96270 96271 f3df19 96270->96271 96274 f3df1f 96270->96274 96278 ef63b2 GetStringTypeW _strftime 96270->96278 96279 ef62fb 39 API calls 96271->96279 96274->96007 96275->96007 96276->96007 96277->96007 96278->96270 96279->96274 96280 f08402 96285 f081be 96280->96285 96283 f0842a 96286 f081ef try_get_first_available_module 96285->96286 96293 f08338 96286->96293 96300 ef8e0b 40 API calls 2 library calls 96286->96300 96288 f083ee 96304 f027ec 26 API calls pre_c_initialization 96288->96304 96290 f08343 96290->96283 96297 f10984 96290->96297 96292 f0838c 96292->96293 96301 ef8e0b 40 API calls 2 library calls 96292->96301 96293->96290 96303 eff2d9 20 API calls __dosmaperr 96293->96303 96295 f083ab 96295->96293 96302 ef8e0b 40 API calls 2 library calls 96295->96302 96305 f10081 96297->96305 96299 f1099f 96299->96283 96300->96292 96301->96295 96302->96293 96303->96288 96304->96290 96307 f1008d BuildCatchObjectHelperInternal 96305->96307 96306 f1009b 96362 eff2d9 20 API calls __dosmaperr 96306->96362 96307->96306 96309 f100d4 96307->96309 96316 f1065b 96309->96316 96310 f100a0 96363 f027ec 26 API calls pre_c_initialization 96310->96363 96315 f100aa __fread_nolock 96315->96299 96317 f10678 96316->96317 96318 f106a6 96317->96318 96319 f1068d 96317->96319 96365 f05221 96318->96365 96379 eff2c6 20 API calls __dosmaperr 96319->96379 96322 f106ab 96323 f106b4 96322->96323 96324 f106cb 96322->96324 96381 eff2c6 20 API calls __dosmaperr 96323->96381 96378 f1039a CreateFileW 96324->96378 96328 f106b9 96382 eff2d9 20 API calls __dosmaperr 96328->96382 96329 f10704 96331 f10781 GetFileType 96329->96331 96333 f10756 GetLastError 96329->96333 96383 f1039a CreateFileW 96329->96383 96332 f1078c GetLastError 96331->96332 96336 f107d3 96331->96336 96385 eff2a3 20 API calls 2 library calls 96332->96385 96384 eff2a3 20 API calls 2 library calls 96333->96384 96387 f0516a 21 API calls 3 library calls 96336->96387 96337 f10692 96380 eff2d9 20 API calls __dosmaperr 96337->96380 96338 f1079a CloseHandle 96338->96337 96342 f107c3 96338->96342 96341 f10749 96341->96331 96341->96333 96386 eff2d9 20 API calls __dosmaperr 96342->96386 96343 f107f4 96345 f10840 96343->96345 96388 f105ab 72 API calls 4 library calls 96343->96388 96350 f1086d 96345->96350 96389 f1014d 72 API calls 4 library calls 96345->96389 96346 f107c8 96346->96337 96349 f10866 96349->96350 96351 f1087e 96349->96351 96352 f086ae __wsopen_s 29 API calls 96350->96352 96353 f100f8 96351->96353 96354 f108fc CloseHandle 96351->96354 96352->96353 96364 f10121 LeaveCriticalSection __wsopen_s 96353->96364 96390 f1039a CreateFileW 96354->96390 96356 f10927 96357 f10931 GetLastError 96356->96357 96358 f1095d 96356->96358 96391 eff2a3 20 API calls 2 library calls 96357->96391 96358->96353 96360 f1093d 96392 f05333 21 API calls 3 library calls 96360->96392 96362->96310 96363->96315 96364->96315 96366 f0522d BuildCatchObjectHelperInternal 96365->96366 96393 f02f5e EnterCriticalSection 96366->96393 96368 f05259 96397 f05000 96368->96397 96371 f05234 96371->96368 96372 f052c7 EnterCriticalSection 96371->96372 96376 f0527b 96371->96376 96375 f052d4 LeaveCriticalSection 96372->96375 96372->96376 96374 f052a4 __fread_nolock 96374->96322 96375->96371 96394 f0532a 96376->96394 96378->96329 96379->96337 96380->96353 96381->96328 96382->96337 96383->96341 96384->96337 96385->96338 96386->96346 96387->96343 96388->96345 96389->96349 96390->96356 96391->96360 96392->96358 96393->96371 96405 f02fa6 LeaveCriticalSection 96394->96405 96396 f05331 96396->96374 96398 f04c7d __dosmaperr 20 API calls 96397->96398 96399 f05012 96398->96399 96403 f0501f 96399->96403 96406 f03405 11 API calls 2 library calls 96399->96406 96400 f029c8 _free 20 API calls 96401 f05071 96400->96401 96401->96376 96404 f05147 EnterCriticalSection 96401->96404 96403->96400 96404->96376 96405->96396 96406->96399 96407 edf7bf 96408 edfcb6 96407->96408 96409 edf7d3 96407->96409 96411 edaceb 23 API calls 96408->96411 96410 edfcc2 96409->96410 96412 eefddb 22 API calls 96409->96412 96413 edaceb 23 API calls 96410->96413 96411->96410 96414 edf7e5 96412->96414 96416 edfd3d 96413->96416 96414->96410 96415 edf83e 96414->96415 96414->96416 96418 ee1310 348 API calls 96415->96418 96434 eded9d messages 96415->96434 96444 f41155 22 API calls 96416->96444 96440 edec76 messages 96418->96440 96419 eefddb 22 API calls 96419->96440 96420 f24beb 96450 f4359c 82 API calls __wsopen_s 96420->96450 96421 edfef7 96421->96434 96446 eda8c7 22 API calls __fread_nolock 96421->96446 96424 f24b0b 96448 f4359c 82 API calls __wsopen_s 96424->96448 96425 eda8c7 22 API calls 96425->96440 96426 f24600 96426->96434 96445 eda8c7 22 API calls __fread_nolock 96426->96445 96431 ef0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96431->96440 96433 edfbe3 96433->96434 96436 f24bdc 96433->96436 96441 edf3ae messages 96433->96441 96435 eda961 22 API calls 96435->96440 96449 f4359c 82 API calls __wsopen_s 96436->96449 96438 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96438->96440 96439 ef00a3 29 API calls pre_c_initialization 96439->96440 96440->96419 96440->96420 96440->96421 96440->96424 96440->96425 96440->96426 96440->96431 96440->96433 96440->96434 96440->96435 96440->96438 96440->96439 96440->96441 96442 ee01e0 348 API calls 2 library calls 96440->96442 96443 ee06a0 41 API calls messages 96440->96443 96441->96434 96447 f4359c 82 API calls __wsopen_s 96441->96447 96442->96440 96443->96440 96444->96434 96445->96434 96446->96434 96447->96434 96448->96434 96449->96420 96450->96434 96451 f12402 96454 ed1410 96451->96454 96455 ed144f mciSendStringW 96454->96455 96456 f124b8 DestroyWindow 96454->96456 96457 ed146b 96455->96457 96458 ed16c6 96455->96458 96469 f124c4 96456->96469 96460 ed1479 96457->96460 96457->96469 96458->96457 96459 ed16d5 UnregisterHotKey 96458->96459 96459->96458 96487 ed182e 96460->96487 96463 f12509 96468 f1252d 96463->96468 96470 f1251c FreeLibrary 96463->96470 96464 f124e2 FindClose 96464->96469 96465 f124d8 96465->96469 96493 ed6246 CloseHandle 96465->96493 96466 ed148e 96466->96468 96474 ed149c 96466->96474 96471 f12541 VirtualFree 96468->96471 96476 ed1509 96468->96476 96469->96463 96469->96464 96469->96465 96470->96463 96471->96468 96472 ed14f8 CoUninitialize 96472->96476 96473 f12589 96479 f12598 messages 96473->96479 96494 f432eb 6 API calls messages 96473->96494 96474->96472 96476->96473 96477 ed1514 96476->96477 96491 ed1944 VirtualFreeEx CloseHandle 96477->96491 96484 f12627 96479->96484 96495 f364d4 22 API calls messages 96479->96495 96481 ed153a 96481->96479 96482 ed161f 96481->96482 96483 ed166d 96482->96483 96482->96484 96483->96484 96492 ed1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96483->96492 96484->96484 96486 ed16c1 96489 ed183b 96487->96489 96488 ed1480 96488->96463 96488->96466 96489->96488 96496 f3702a 22 API calls 96489->96496 96491->96481 96492->96486 96493->96465 96494->96473 96495->96479 96496->96489 96497 ef03fb 96498 ef0407 BuildCatchObjectHelperInternal 96497->96498 96526 eefeb1 96498->96526 96500 ef040e 96501 ef0561 96500->96501 96505 ef0438 96500->96505 96556 ef083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96501->96556 96503 ef0568 96549 ef4e52 96503->96549 96515 ef0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96505->96515 96537 f0247d 96505->96537 96511 ef0457 96513 ef04d8 96545 ef0959 96513->96545 96515->96513 96552 ef4e1a 38 API calls 2 library calls 96515->96552 96517 ef04de 96518 ef04f3 96517->96518 96553 ef0992 GetModuleHandleW 96518->96553 96520 ef04fa 96520->96503 96521 ef04fe 96520->96521 96522 ef0507 96521->96522 96554 ef4df5 28 API calls _abort 96521->96554 96555 ef0040 13 API calls 2 library calls 96522->96555 96525 ef050f 96525->96511 96527 eefeba 96526->96527 96558 ef0698 IsProcessorFeaturePresent 96527->96558 96529 eefec6 96559 ef2c94 10 API calls 3 library calls 96529->96559 96531 eefecb 96532 eefecf 96531->96532 96560 f02317 96531->96560 96532->96500 96535 eefee6 96535->96500 96540 f02494 96537->96540 96538 ef0a8c CatchGuardHandler 5 API calls 96539 ef0451 96538->96539 96539->96511 96541 f02421 96539->96541 96540->96538 96542 f02450 96541->96542 96543 ef0a8c CatchGuardHandler 5 API calls 96542->96543 96544 f02479 96543->96544 96544->96515 96611 ef2340 96545->96611 96548 ef097f 96548->96517 96613 ef4bcf 96549->96613 96552->96513 96553->96520 96554->96522 96555->96525 96556->96503 96558->96529 96559->96531 96564 f0d1f6 96560->96564 96563 ef2cbd 8 API calls 3 library calls 96563->96532 96567 f0d213 96564->96567 96568 f0d20f 96564->96568 96566 eefed8 96566->96535 96566->96563 96567->96568 96570 f04bfb 96567->96570 96582 ef0a8c 96568->96582 96571 f04c07 BuildCatchObjectHelperInternal 96570->96571 96589 f02f5e EnterCriticalSection 96571->96589 96573 f04c0e 96590 f050af 96573->96590 96575 f04c1d 96576 f04c2c 96575->96576 96603 f04a8f 29 API calls 96575->96603 96605 f04c48 LeaveCriticalSection _abort 96576->96605 96579 f04c27 96604 f04b45 GetStdHandle GetFileType 96579->96604 96580 f04c3d __fread_nolock 96580->96567 96583 ef0a97 IsProcessorFeaturePresent 96582->96583 96584 ef0a95 96582->96584 96586 ef0c5d 96583->96586 96584->96566 96610 ef0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96586->96610 96588 ef0d40 96588->96566 96589->96573 96591 f050bb BuildCatchObjectHelperInternal 96590->96591 96592 f050c8 96591->96592 96593 f050df 96591->96593 96607 eff2d9 20 API calls __dosmaperr 96592->96607 96606 f02f5e EnterCriticalSection 96593->96606 96596 f050cd 96608 f027ec 26 API calls pre_c_initialization 96596->96608 96598 f050d7 __fread_nolock 96598->96575 96599 f05117 96609 f0513e LeaveCriticalSection _abort 96599->96609 96601 f05000 __wsopen_s 21 API calls 96602 f050eb 96601->96602 96602->96599 96602->96601 96603->96579 96604->96576 96605->96580 96606->96602 96607->96596 96608->96598 96609->96598 96610->96588 96612 ef096c GetStartupInfoW 96611->96612 96612->96548 96614 ef4bdb _abort 96613->96614 96615 ef4bf4 96614->96615 96616 ef4be2 96614->96616 96637 f02f5e EnterCriticalSection 96615->96637 96652 ef4d29 GetModuleHandleW 96616->96652 96619 ef4be7 96619->96615 96653 ef4d6d GetModuleHandleExW 96619->96653 96620 ef4c99 96641 ef4cd9 96620->96641 96624 ef4c70 96628 ef4c88 96624->96628 96633 f02421 _abort 5 API calls 96624->96633 96626 ef4cb6 96644 ef4ce8 96626->96644 96627 ef4ce2 96661 f11d29 5 API calls CatchGuardHandler 96627->96661 96634 f02421 _abort 5 API calls 96628->96634 96629 ef4bfb 96629->96620 96629->96624 96638 f021a8 96629->96638 96633->96628 96634->96620 96637->96629 96662 f01ee1 96638->96662 96681 f02fa6 LeaveCriticalSection 96641->96681 96643 ef4cb2 96643->96626 96643->96627 96682 f0360c 96644->96682 96647 ef4d16 96650 ef4d6d _abort 8 API calls 96647->96650 96648 ef4cf6 GetPEB 96648->96647 96649 ef4d06 GetCurrentProcess TerminateProcess 96648->96649 96649->96647 96651 ef4d1e ExitProcess 96650->96651 96652->96619 96654 ef4dba 96653->96654 96655 ef4d97 GetProcAddress 96653->96655 96656 ef4dc9 96654->96656 96657 ef4dc0 FreeLibrary 96654->96657 96658 ef4dac 96655->96658 96659 ef0a8c CatchGuardHandler 5 API calls 96656->96659 96657->96656 96658->96654 96660 ef4bf3 96659->96660 96660->96615 96665 f01e90 96662->96665 96664 f01f05 96664->96624 96666 f01e9c BuildCatchObjectHelperInternal 96665->96666 96673 f02f5e EnterCriticalSection 96666->96673 96668 f01eaa 96674 f01f31 96668->96674 96672 f01ec8 __fread_nolock 96672->96664 96673->96668 96675 f01f51 96674->96675 96678 f01f59 96674->96678 96676 ef0a8c CatchGuardHandler 5 API calls 96675->96676 96677 f01eb7 96676->96677 96680 f01ed5 LeaveCriticalSection _abort 96677->96680 96678->96675 96679 f029c8 _free 20 API calls 96678->96679 96679->96675 96680->96672 96681->96643 96683 f03631 96682->96683 96684 f03627 96682->96684 96689 f02fd7 5 API calls 2 library calls 96683->96689 96686 ef0a8c CatchGuardHandler 5 API calls 96684->96686 96687 ef4cf2 96686->96687 96687->96647 96687->96648 96688 f03648 96688->96684 96689->96688 96690 f12ba5 96691 ed2b25 96690->96691 96692 f12baf 96690->96692 96718 ed2b83 7 API calls 96691->96718 96736 ed3a5a 96692->96736 96695 f12bb8 96697 ed9cb3 22 API calls 96695->96697 96700 f12bc6 96697->96700 96699 ed2b2f 96709 ed2b44 96699->96709 96722 ed3837 96699->96722 96701 f12bf5 96700->96701 96702 f12bce 96700->96702 96705 ed33c6 22 API calls 96701->96705 96743 ed33c6 96702->96743 96707 f12bf1 GetForegroundWindow ShellExecuteW 96705->96707 96714 f12c26 96707->96714 96708 ed2b5f 96716 ed2b66 SetCurrentDirectoryW 96708->96716 96709->96708 96732 ed30f2 96709->96732 96713 f12be7 96715 ed33c6 22 API calls 96713->96715 96714->96708 96715->96707 96717 ed2b7a 96716->96717 96753 ed2cd4 7 API calls 96718->96753 96720 ed2b2a 96721 ed2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96720->96721 96721->96699 96723 ed3862 ___scrt_fastfail 96722->96723 96754 ed4212 96723->96754 96726 ed38e8 96728 f13386 Shell_NotifyIconW 96726->96728 96729 ed3906 Shell_NotifyIconW 96726->96729 96758 ed3923 96729->96758 96731 ed391c 96731->96709 96733 ed3154 96732->96733 96734 ed3104 ___scrt_fastfail 96732->96734 96733->96708 96735 ed3123 Shell_NotifyIconW 96734->96735 96735->96733 96737 f11f50 __wsopen_s 96736->96737 96738 ed3a67 GetModuleFileNameW 96737->96738 96739 ed9cb3 22 API calls 96738->96739 96740 ed3a8d 96739->96740 96741 ed3aa2 23 API calls 96740->96741 96742 ed3a97 96741->96742 96742->96695 96744 ed33dd 96743->96744 96745 f130bb 96743->96745 96789 ed33ee 96744->96789 96747 eefddb 22 API calls 96745->96747 96749 f130c5 _wcslen 96747->96749 96748 ed33e8 96752 ed6350 22 API calls 96748->96752 96750 eefe0b 22 API calls 96749->96750 96751 f130fe __fread_nolock 96750->96751 96752->96713 96753->96720 96755 f135a4 96754->96755 96756 ed38b7 96754->96756 96755->96756 96757 f135ad DestroyIcon 96755->96757 96756->96726 96780 f3c874 42 API calls _strftime 96756->96780 96757->96756 96759 ed393f 96758->96759 96778 ed3a13 96758->96778 96781 ed6270 96759->96781 96762 f13393 LoadStringW 96765 f133ad 96762->96765 96763 ed395a 96764 ed6b57 22 API calls 96763->96764 96766 ed396f 96764->96766 96773 ed3994 ___scrt_fastfail 96765->96773 96787 eda8c7 22 API calls __fread_nolock 96765->96787 96767 ed397c 96766->96767 96768 f133c9 96766->96768 96767->96765 96770 ed3986 96767->96770 96788 ed6350 22 API calls 96768->96788 96786 ed6350 22 API calls 96770->96786 96776 ed39f9 Shell_NotifyIconW 96773->96776 96774 f133d7 96774->96773 96775 ed33c6 22 API calls 96774->96775 96777 f133f9 96775->96777 96776->96778 96779 ed33c6 22 API calls 96777->96779 96778->96731 96779->96773 96780->96726 96782 eefe0b 22 API calls 96781->96782 96783 ed6295 96782->96783 96784 eefddb 22 API calls 96783->96784 96785 ed394d 96784->96785 96785->96762 96785->96763 96786->96773 96787->96773 96788->96774 96790 ed33fe _wcslen 96789->96790 96791 f1311d 96790->96791 96792 ed3411 96790->96792 96794 eefddb 22 API calls 96791->96794 96799 eda587 96792->96799 96796 f13127 96794->96796 96795 ed341e __fread_nolock 96795->96748 96797 eefe0b 22 API calls 96796->96797 96798 f13157 __fread_nolock 96797->96798 96800 eda59d 96799->96800 96803 eda598 __fread_nolock 96799->96803 96801 f1f80f 96800->96801 96802 eefe0b 22 API calls 96800->96802 96802->96803 96803->96795 96804 ed1098 96809 ed42de 96804->96809 96808 ed10a7 96810 eda961 22 API calls 96809->96810 96811 ed42f5 GetVersionExW 96810->96811 96812 ed6b57 22 API calls 96811->96812 96813 ed4342 96812->96813 96814 ed93b2 22 API calls 96813->96814 96828 ed4378 96813->96828 96815 ed436c 96814->96815 96816 ed37a0 22 API calls 96815->96816 96816->96828 96817 ed441b GetCurrentProcess IsWow64Process 96818 ed4437 96817->96818 96819 ed444f LoadLibraryA 96818->96819 96820 f13824 GetSystemInfo 96818->96820 96821 ed449c GetSystemInfo 96819->96821 96822 ed4460 GetProcAddress 96819->96822 96823 ed4476 96821->96823 96822->96821 96825 ed4470 GetNativeSystemInfo 96822->96825 96826 ed447a FreeLibrary 96823->96826 96827 ed109d 96823->96827 96824 f137df 96825->96823 96826->96827 96829 ef00a3 29 API calls __onexit 96827->96829 96828->96817 96828->96824 96829->96808 96830 ed105b 96835 ed344d 96830->96835 96832 ed106a 96866 ef00a3 29 API calls __onexit 96832->96866 96834 ed1074 96836 ed345d __wsopen_s 96835->96836 96837 eda961 22 API calls 96836->96837 96838 ed3513 96837->96838 96839 ed3a5a 24 API calls 96838->96839 96840 ed351c 96839->96840 96867 ed3357 96840->96867 96843 ed33c6 22 API calls 96844 ed3535 96843->96844 96845 ed515f 22 API calls 96844->96845 96846 ed3544 96845->96846 96847 eda961 22 API calls 96846->96847 96848 ed354d 96847->96848 96849 eda6c3 22 API calls 96848->96849 96850 ed3556 RegOpenKeyExW 96849->96850 96851 f13176 RegQueryValueExW 96850->96851 96856 ed3578 96850->96856 96852 f13193 96851->96852 96853 f1320c RegCloseKey 96851->96853 96854 eefe0b 22 API calls 96852->96854 96853->96856 96861 f1321e _wcslen 96853->96861 96855 f131ac 96854->96855 96857 ed5722 22 API calls 96855->96857 96856->96832 96858 f131b7 RegQueryValueExW 96857->96858 96859 f131d4 96858->96859 96863 f131ee messages 96858->96863 96860 ed6b57 22 API calls 96859->96860 96860->96863 96861->96856 96862 ed4c6d 22 API calls 96861->96862 96864 ed9cb3 22 API calls 96861->96864 96865 ed515f 22 API calls 96861->96865 96862->96861 96863->96853 96864->96861 96865->96861 96866->96834 96868 f11f50 __wsopen_s 96867->96868 96869 ed3364 GetFullPathNameW 96868->96869 96870 ed3386 96869->96870 96871 ed6b57 22 API calls 96870->96871 96872 ed33a4 96871->96872 96872->96843 96873 ed2e37 96874 eda961 22 API calls 96873->96874 96875 ed2e4d 96874->96875 96952 ed4ae3 96875->96952 96877 ed2e6b 96878 ed3a5a 24 API calls 96877->96878 96879 ed2e7f 96878->96879 96880 ed9cb3 22 API calls 96879->96880 96881 ed2e8c 96880->96881 96882 ed4ecb 94 API calls 96881->96882 96883 ed2ea5 96882->96883 96884 ed2ead 96883->96884 96885 f12cb0 96883->96885 96966 eda8c7 22 API calls __fread_nolock 96884->96966 96886 f42cf9 80 API calls 96885->96886 96887 f12cc3 96886->96887 96888 f12ccf 96887->96888 96890 ed4f39 68 API calls 96887->96890 96893 ed4f39 68 API calls 96888->96893 96890->96888 96891 ed2ec3 96967 ed6f88 22 API calls 96891->96967 96896 f12ce5 96893->96896 96894 ed2ecf 96895 ed9cb3 22 API calls 96894->96895 96897 ed2edc 96895->96897 96984 ed3084 22 API calls 96896->96984 96968 eda81b 41 API calls 96897->96968 96900 f12d02 96985 ed3084 22 API calls 96900->96985 96901 ed2eec 96902 ed9cb3 22 API calls 96901->96902 96904 ed2f12 96902->96904 96969 eda81b 41 API calls 96904->96969 96905 f12d1e 96907 ed3a5a 24 API calls 96905->96907 96908 f12d44 96907->96908 96986 ed3084 22 API calls 96908->96986 96909 ed2f21 96912 eda961 22 API calls 96909->96912 96911 f12d50 96987 eda8c7 22 API calls __fread_nolock 96911->96987 96914 ed2f3f 96912->96914 96970 ed3084 22 API calls 96914->96970 96916 f12d5e 96988 ed3084 22 API calls 96916->96988 96917 ed2f4b 96971 ef4a28 40 API calls 3 library calls 96917->96971 96920 f12d6d 96989 eda8c7 22 API calls __fread_nolock 96920->96989 96921 ed2f59 96921->96896 96922 ed2f63 96921->96922 96972 ef4a28 40 API calls 3 library calls 96922->96972 96925 f12d83 96990 ed3084 22 API calls 96925->96990 96926 ed2f6e 96926->96900 96928 ed2f78 96926->96928 96973 ef4a28 40 API calls 3 library calls 96928->96973 96929 f12d90 96931 ed2f83 96931->96905 96932 ed2f8d 96931->96932 96974 ef4a28 40 API calls 3 library calls 96932->96974 96934 ed2f98 96935 ed2fdc 96934->96935 96975 ed3084 22 API calls 96934->96975 96935->96920 96936 ed2fe8 96935->96936 96936->96929 96978 ed63eb 22 API calls 96936->96978 96938 ed2fbf 96976 eda8c7 22 API calls __fread_nolock 96938->96976 96941 ed2ff8 96979 ed6a50 22 API calls 96941->96979 96942 ed2fcd 96977 ed3084 22 API calls 96942->96977 96945 ed3006 96980 ed70b0 23 API calls 96945->96980 96949 ed3021 96950 ed3065 96949->96950 96981 ed6f88 22 API calls 96949->96981 96982 ed70b0 23 API calls 96949->96982 96983 ed3084 22 API calls 96949->96983 96953 ed4af0 __wsopen_s 96952->96953 96954 ed6b57 22 API calls 96953->96954 96955 ed4b22 96953->96955 96954->96955 96962 ed4b58 96955->96962 96991 ed4c6d 96955->96991 96957 ed9cb3 22 API calls 96959 ed4c52 96957->96959 96958 ed9cb3 22 API calls 96958->96962 96961 ed515f 22 API calls 96959->96961 96960 ed4c6d 22 API calls 96960->96962 96964 ed4c5e 96961->96964 96962->96958 96962->96960 96963 ed515f 22 API calls 96962->96963 96965 ed4c29 96962->96965 96963->96962 96964->96877 96965->96957 96965->96964 96966->96891 96967->96894 96968->96901 96969->96909 96970->96917 96971->96921 96972->96926 96973->96931 96974->96934 96975->96938 96976->96942 96977->96935 96978->96941 96979->96945 96980->96949 96981->96949 96982->96949 96983->96949 96984->96900 96985->96905 96986->96911 96987->96916 96988->96920 96989->96925 96990->96929 96992 edaec9 22 API calls 96991->96992 96993 ed4c78 96992->96993 96993->96955 96994 ed3156 96997 ed3170 96994->96997 96998 ed3187 96997->96998 96999 ed318c 96998->96999 97000 ed31eb 96998->97000 97037 ed31e9 96998->97037 97004 ed3199 96999->97004 97005 ed3265 PostQuitMessage 96999->97005 97002 f12dfb 97000->97002 97003 ed31f1 97000->97003 97001 ed31d0 DefWindowProcW 97029 ed316a 97001->97029 97052 ed18e2 10 API calls 97002->97052 97006 ed321d SetTimer RegisterWindowMessageW 97003->97006 97007 ed31f8 97003->97007 97009 ed31a4 97004->97009 97010 f12e7c 97004->97010 97005->97029 97014 ed3246 CreatePopupMenu 97006->97014 97006->97029 97011 ed3201 KillTimer 97007->97011 97012 f12d9c 97007->97012 97015 ed31ae 97009->97015 97016 f12e68 97009->97016 97055 f3bf30 34 API calls ___scrt_fastfail 97010->97055 97020 ed30f2 Shell_NotifyIconW 97011->97020 97018 f12da1 97012->97018 97019 f12dd7 MoveWindow 97012->97019 97013 f12e1c 97053 eee499 42 API calls 97013->97053 97014->97029 97023 ed31b9 97015->97023 97024 f12e4d 97015->97024 97042 f3c161 97016->97042 97026 f12da7 97018->97026 97027 f12dc6 SetFocus 97018->97027 97019->97029 97028 ed3214 97020->97028 97030 ed31c4 97023->97030 97031 ed3253 97023->97031 97024->97001 97054 f30ad7 22 API calls 97024->97054 97025 f12e8e 97025->97001 97025->97029 97026->97030 97032 f12db0 97026->97032 97027->97029 97049 ed3c50 DeleteObject DestroyWindow 97028->97049 97030->97001 97039 ed30f2 Shell_NotifyIconW 97030->97039 97050 ed326f 44 API calls ___scrt_fastfail 97031->97050 97051 ed18e2 10 API calls 97032->97051 97037->97001 97038 ed3263 97038->97029 97040 f12e41 97039->97040 97041 ed3837 49 API calls 97040->97041 97041->97037 97043 f3c276 97042->97043 97044 f3c179 ___scrt_fastfail 97042->97044 97043->97029 97045 ed3923 24 API calls 97044->97045 97047 f3c1a0 97045->97047 97046 f3c25f KillTimer SetTimer 97046->97043 97047->97046 97048 f3c251 Shell_NotifyIconW 97047->97048 97048->97046 97049->97029 97050->97038 97051->97029 97052->97013 97053->97030 97054->97037 97055->97025 97056 ed1033 97061 ed4c91 97056->97061 97060 ed1042 97062 eda961 22 API calls 97061->97062 97063 ed4cff 97062->97063 97069 ed3af0 97063->97069 97066 ed4d9c 97067 ed1038 97066->97067 97072 ed51f7 22 API calls __fread_nolock 97066->97072 97068 ef00a3 29 API calls __onexit 97067->97068 97068->97060 97073 ed3b1c 97069->97073 97072->97066 97074 ed3b0f 97073->97074 97075 ed3b29 97073->97075 97074->97066 97075->97074 97076 ed3b30 RegOpenKeyExW 97075->97076 97076->97074 97077 ed3b4a RegQueryValueExW 97076->97077 97078 ed3b6b 97077->97078 97079 ed3b80 RegCloseKey 97077->97079 97078->97079 97079->97074

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 389 ed42de-ed434d call eda961 GetVersionExW call ed6b57 394 f13617-f1362a 389->394 395 ed4353 389->395 396 f1362b-f1362f 394->396 397 ed4355-ed4357 395->397 398 f13631 396->398 399 f13632-f1363e 396->399 400 ed435d-ed43bc call ed93b2 call ed37a0 397->400 401 f13656 397->401 398->399 399->396 402 f13640-f13642 399->402 417 f137df-f137e6 400->417 418 ed43c2-ed43c4 400->418 406 f1365d-f13660 401->406 402->397 405 f13648-f1364f 402->405 405->394 408 f13651 405->408 409 ed441b-ed4435 GetCurrentProcess IsWow64Process 406->409 410 f13666-f136a8 406->410 408->401 413 ed4494-ed449a 409->413 414 ed4437 409->414 410->409 411 f136ae-f136b1 410->411 415 f136b3-f136bd 411->415 416 f136db-f136e5 411->416 419 ed443d-ed4449 413->419 414->419 420 f136ca-f136d6 415->420 421 f136bf-f136c5 415->421 423 f136e7-f136f3 416->423 424 f136f8-f13702 416->424 425 f13806-f13809 417->425 426 f137e8 417->426 418->406 422 ed43ca-ed43dd 418->422 427 ed444f-ed445e LoadLibraryA 419->427 428 f13824-f13828 GetSystemInfo 419->428 420->409 421->409 429 f13726-f1372f 422->429 430 ed43e3-ed43e5 422->430 423->409 432 f13715-f13721 424->432 433 f13704-f13710 424->433 434 f137f4-f137fc 425->434 435 f1380b-f1381a 425->435 431 f137ee 426->431 436 ed449c-ed44a6 GetSystemInfo 427->436 437 ed4460-ed446e GetProcAddress 427->437 441 f13731-f13737 429->441 442 f1373c-f13748 429->442 439 ed43eb-ed43ee 430->439 440 f1374d-f13762 430->440 431->434 432->409 433->409 434->425 435->431 443 f1381c-f13822 435->443 438 ed4476-ed4478 436->438 437->436 444 ed4470-ed4474 GetNativeSystemInfo 437->444 445 ed447a-ed447b FreeLibrary 438->445 446 ed4481-ed4493 438->446 447 f13791-f13794 439->447 448 ed43f4-ed440f 439->448 449 f13764-f1376a 440->449 450 f1376f-f1377b 440->450 441->409 442->409 443->434 444->438 445->446 447->409 451 f1379a-f137c1 447->451 452 f13780-f1378c 448->452 453 ed4415 448->453 449->409 450->409 454 f137c3-f137c9 451->454 455 f137ce-f137da 451->455 452->409 453->409 454->409 455->409
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 00ED430D
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,00F6CB64,00000000,?,?), ref: 00ED4422
                                                                                                                                                                                                                                                                                                                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00ED4429
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00ED4454
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00ED4466
                                                                                                                                                                                                                                                                                                                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00ED4474
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 00ED447B
                                                                                                                                                                                                                                                                                                                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 00ED44A0
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3cd03ceaf0122f5fc882e305d61f22d3c00c4b7822fa8e5a446363e96910b41f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 00e491065a476b696d574c21639bc5ef53ab61cd30a2a7667c817296d0a8f651
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3cd03ceaf0122f5fc882e305d61f22d3c00c4b7822fa8e5a446363e96910b41f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 98A191E191A3CCDFCF11CFA9B8401E53EA4BB37344F0A589AD091A7BA2D6704549FB61

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 793 ed42a2-ed42ba CreateStreamOnHGlobal 794 ed42bc-ed42d3 FindResourceExW 793->794 795 ed42da-ed42dd 793->795 796 ed42d9 794->796 797 f135ba-f135c9 LoadResource 794->797 796->795 797->796 798 f135cf-f135dd SizeofResource 797->798 798->796 799 f135e3-f135ee LockResource 798->799 799->796 800 f135f4-f13612 799->800 800->796
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00ED50AA,?,?,00000000,00000000), ref: 00ED42B2
                                                                                                                                                                                                                                                                                                                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00ED50AA,?,?,00000000,00000000), ref: 00ED42C9
                                                                                                                                                                                                                                                                                                                                                      • LoadResource.KERNEL32(?,00000000,?,?,00ED50AA,?,?,00000000,00000000,?,?,?,?,?,?,00ED4F20), ref: 00F135BE
                                                                                                                                                                                                                                                                                                                                                      • SizeofResource.KERNEL32(?,00000000,?,?,00ED50AA,?,?,00000000,00000000,?,?,?,?,?,?,00ED4F20), ref: 00F135D3
                                                                                                                                                                                                                                                                                                                                                      • LockResource.KERNEL32(00ED50AA,?,?,00ED50AA,?,?,00000000,00000000,?,?,?,?,?,?,00ED4F20,?), ref: 00F135E6
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                                                                                                                                      • String ID: SCRIPT
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 560a92659011197e59ba6df225db8a6d2de5af5706a45dd5c96064ca2bf7b772
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8af8d8d6ac7de4ef1dcaa0e64b155c408eddf46a2a43ca1fa167bfc0bea35c6b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 560a92659011197e59ba6df225db8a6d2de5af5706a45dd5c96064ca2bf7b772
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1411CEB0200305BFE7219B65DC48F677BBAEBC5B51F10416AF896D62A0DBB1DC00A6B0

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00ED2B6B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00FA1418,?,00ED2E7F,?,?,?,00000000), ref: 00ED3A78
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(runas,?,?,?,?,?,00F92224), ref: 00F12C10
                                                                                                                                                                                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,?,?,00F92224), ref: 00F12C17
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: runas
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 448630720-4000483414
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7b007e58e92ba1e45058eaac2719a742f7a406aba43fe499aea564aedfb86ef0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c160ed09f051672fa0c23f4ef41172c90771e8649363398dbe1c9c548e3540d5
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7b007e58e92ba1e45058eaac2719a742f7a406aba43fe499aea564aedfb86ef0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0611D5312082055AD704FF74DC519BEB7E4EBA6744F04242FF192622A3CF618A4BA713

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00F3D501
                                                                                                                                                                                                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00F3D50F
                                                                                                                                                                                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00F3D52F
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNELBASE(00000000), ref: 00F3D5DC
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 420147892-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5a907974488e813bb2110aa16a22ac5dfb2eec2ff606cd1c66961c8b59868409
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: bee6531d30915fc3867704e3ac46e517b42fff41f1fa964fe0df569900bc711f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5a907974488e813bb2110aa16a22ac5dfb2eec2ff606cd1c66961c8b59868409
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8331A1721083009FD304EF54DC81AAFBBE8EF99364F14052DF591972A2EB719A45DB92

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 993 f3dbbe-f3dbda lstrlenW 994 f3dc06 993->994 995 f3dbdc-f3dbe6 GetFileAttributesW 993->995 996 f3dc09-f3dc0d 994->996 995->996 997 f3dbe8-f3dbf7 FindFirstFileW 995->997 997->994 998 f3dbf9-f3dc04 FindClose 997->998 998->996
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,00F15222), ref: 00F3DBCE
                                                                                                                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?), ref: 00F3DBDD
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00F3DBEE
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F3DBFA
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2695905019-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f47ec385111873d81f740e11a46a818f080b767212e26765c5cd19df1fd2a92d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 1249c9c11922e080fa1de46bdfd40c7bf722a0a9f5bbf3a37fc3a6ac7254308a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f47ec385111873d81f740e11a46a818f080b767212e26765c5cd19df1fd2a92d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 87F0ED718209186782206B7CBC0D8BA77AC9E02374F105702F8F6C20F0EBF09D94E6D6
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00F028E9,?,00EF4CBE,00F028E9,00F988B8,0000000C,00EF4E15,00F028E9,00000002,00000000,?,00F028E9), ref: 00EF4D09
                                                                                                                                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,?,00EF4CBE,00F028E9,00F988B8,0000000C,00EF4E15,00F028E9,00000002,00000000,?,00F028E9), ref: 00EF4D10
                                                                                                                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00EF4D22
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1703294689-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0caf00d071689251cf5b030c0adb1461a6de6b156841bffa2a70e3d19a08e14a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 62b9f682de89c9536fd0e214722692762812aabd684289eeb6a08c61b97a9c3c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0caf00d071689251cf5b030c0adb1461a6de6b156841bffa2a70e3d19a08e14a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34E0B6B100014CABDF11AF54DD0AA6A3F69EB85785B104014FDA59A262DB76DD42EA80

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 0 f5aff9-f5b056 call ef2340 3 f5b094-f5b098 0->3 4 f5b058-f5b06b call edb567 0->4 6 f5b0dd-f5b0e0 3->6 7 f5b09a-f5b0bb call edb567 * 2 3->7 12 f5b06d-f5b092 call edb567 * 2 4->12 13 f5b0c8 4->13 9 f5b0f5-f5b119 call ed7510 call ed7620 6->9 10 f5b0e2-f5b0e5 6->10 29 f5b0bf-f5b0c4 7->29 31 f5b11f-f5b178 call ed7510 call ed7620 call ed7510 call ed7620 call ed7510 call ed7620 9->31 32 f5b1d8-f5b1e0 9->32 14 f5b0e8-f5b0ed call edb567 10->14 12->29 17 f5b0cb-f5b0cf 13->17 14->9 23 f5b0d1-f5b0d7 17->23 24 f5b0d9-f5b0db 17->24 23->14 24->6 24->9 29->6 33 f5b0c6 29->33 82 f5b1a6-f5b1d6 GetSystemDirectoryW call eefe0b GetSystemDirectoryW 31->82 83 f5b17a-f5b195 call ed7510 call ed7620 31->83 36 f5b1e2-f5b1fd call ed7510 call ed7620 32->36 37 f5b20a-f5b238 GetCurrentDirectoryW call eefe0b GetCurrentDirectoryW 32->37 33->17 36->37 53 f5b1ff-f5b208 call ef4963 36->53 45 f5b23c 37->45 48 f5b240-f5b244 45->48 51 f5b275-f5b285 call f400d9 48->51 52 f5b246-f5b270 call ed9c6e * 3 48->52 62 f5b287-f5b289 51->62 63 f5b28b-f5b2e1 call f407c0 call f406e6 call f405a7 51->63 52->51 53->37 53->51 66 f5b2ee-f5b2f2 62->66 63->66 98 f5b2e3 63->98 71 f5b2f8-f5b321 call f311c8 66->71 72 f5b39a-f5b3be CreateProcessW 66->72 87 f5b323-f5b328 call f31201 71->87 88 f5b32a call f314ce 71->88 76 f5b3c1-f5b3d4 call eefe14 * 2 72->76 103 f5b3d6-f5b3e8 76->103 104 f5b42f-f5b43d CloseHandle 76->104 82->45 83->82 105 f5b197-f5b1a0 call ef4963 83->105 97 f5b32f-f5b33c call ef4963 87->97 88->97 113 f5b347-f5b357 call ef4963 97->113 114 f5b33e-f5b345 97->114 98->66 109 f5b3ed-f5b3fc 103->109 110 f5b3ea 103->110 107 f5b49c 104->107 108 f5b43f-f5b444 104->108 105->48 105->82 111 f5b4a0-f5b4a4 107->111 115 f5b446-f5b44c CloseHandle 108->115 116 f5b451-f5b456 108->116 117 f5b401-f5b42a GetLastError call ed630c call edcfa0 109->117 118 f5b3fe 109->118 110->109 120 f5b4a6-f5b4b0 111->120 121 f5b4b2-f5b4bc 111->121 136 f5b362-f5b372 call ef4963 113->136 137 f5b359-f5b360 113->137 114->113 114->114 115->116 124 f5b463-f5b468 116->124 125 f5b458-f5b45e CloseHandle 116->125 127 f5b4e5-f5b4f6 call f40175 117->127 118->117 120->127 128 f5b4c4-f5b4e3 call edcfa0 CloseHandle 121->128 129 f5b4be 121->129 131 f5b475-f5b49a call f409d9 call f5b536 124->131 132 f5b46a-f5b470 CloseHandle 124->132 125->124 128->127 129->128 131->111 132->131 146 f5b374-f5b37b 136->146 147 f5b37d-f5b398 call eefe14 * 3 136->147 137->136 137->137 146->146 146->147 147->76
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F5B198
                                                                                                                                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F5B1B0
                                                                                                                                                                                                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F5B1D4
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F5B200
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F5B214
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F5B236
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F5B332
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F405A7: GetStdHandle.KERNEL32(000000F6), ref: 00F405C6
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F5B34B
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F5B366
                                                                                                                                                                                                                                                                                                                                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F5B3B6
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000), ref: 00F5B407
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F5B439
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F5B44A
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F5B45C
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F5B46E
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F5B4E3
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2178637699-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f3281e0c7ff99c5fb2c47f380fef0c147ff2c518aac95f71bb4ea564f74d749c
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 636014845b5027e986bf4090dfd926e34937bab5010b86cacfc3c11b24b5ef55
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f3281e0c7ff99c5fb2c47f380fef0c147ff2c518aac95f71bb4ea564f74d749c
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C3F18D316083409FC724EF24C891B6EBBE5EF85320F14855EF9959B2A2DB31EC45DB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetInputState.USER32 ref: 00EDD807
                                                                                                                                                                                                                                                                                                                                                      • timeGetTime.WINMM ref: 00EDDA07
                                                                                                                                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EDDB28
                                                                                                                                                                                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 00EDDB7B
                                                                                                                                                                                                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 00EDDB89
                                                                                                                                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EDDB9F
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNELBASE(0000000A), ref: 00EDDBB1
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2189390790-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1654880738434bccf5a3fa6cbf26f3d49154295359368ae42f44665e2de16e95
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 207e62842f14a046884552d59db09e19937d4d48b6288ca42e73567b55d6c46a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1654880738434bccf5a3fa6cbf26f3d49154295359368ae42f44665e2de16e95
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AA422330608345EFD728CF24CC94BAAB7E0FF86314F14951AE495A7391D7B5E845EB82

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00ED2D07
                                                                                                                                                                                                                                                                                                                                                      • RegisterClassExW.USER32(00000030), ref: 00ED2D31
                                                                                                                                                                                                                                                                                                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00ED2D42
                                                                                                                                                                                                                                                                                                                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00ED2D5F
                                                                                                                                                                                                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00ED2D6F
                                                                                                                                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A9), ref: 00ED2D85
                                                                                                                                                                                                                                                                                                                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00ED2D94
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 47dd2edd4a8c69bb65bc8fe7852d04f9ae87575a4b6376c4ec27e8b9dbec219b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c5c8e3a241ef32947d380e91c032389df242839fd7f11a771a88117faa567bcb
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 47dd2edd4a8c69bb65bc8fe7852d04f9ae87575a4b6376c4ec27e8b9dbec219b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3A21F4B590131CAFDB00DFA4EC49BEEBBB8FB09700F00411AF5A1A62A0D7B54544EF91

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 457 f1065b-f1068b call f1042f 460 f106a6-f106b2 call f05221 457->460 461 f1068d-f10698 call eff2c6 457->461 466 f106b4-f106c9 call eff2c6 call eff2d9 460->466 467 f106cb-f10714 call f1039a 460->467 468 f1069a-f106a1 call eff2d9 461->468 466->468 477 f10781-f1078a GetFileType 467->477 478 f10716-f1071f 467->478 475 f1097d-f10983 468->475 479 f107d3-f107d6 477->479 480 f1078c-f107bd GetLastError call eff2a3 CloseHandle 477->480 482 f10721-f10725 478->482 483 f10756-f1077c GetLastError call eff2a3 478->483 486 f107d8-f107dd 479->486 487 f107df-f107e5 479->487 480->468 496 f107c3-f107ce call eff2d9 480->496 482->483 488 f10727-f10754 call f1039a 482->488 483->468 491 f107e9-f10837 call f0516a 486->491 487->491 492 f107e7 487->492 488->477 488->483 499 f10847-f1086b call f1014d 491->499 500 f10839-f10845 call f105ab 491->500 492->491 496->468 507 f1086d 499->507 508 f1087e-f108c1 499->508 500->499 506 f1086f-f10879 call f086ae 500->506 506->475 507->506 510 f108c3-f108c7 508->510 511 f108e2-f108f0 508->511 510->511 515 f108c9-f108dd 510->515 512 f108f6-f108fa 511->512 513 f1097b 511->513 512->513 516 f108fc-f1092f CloseHandle call f1039a 512->516 513->475 515->511 519 f10931-f1095d GetLastError call eff2a3 call f05333 516->519 520 f10963-f10977 516->520 519->520 520->513
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F1039A: CreateFileW.KERNELBASE(00000000,00000000,?,00F10704,?,?,00000000,?,00F10704,00000000,0000000C), ref: 00F103B7
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F1076F
                                                                                                                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F10776
                                                                                                                                                                                                                                                                                                                                                      • GetFileType.KERNELBASE(00000000), ref: 00F10782
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F1078C
                                                                                                                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F10795
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F107B5
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F108FF
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F10931
                                                                                                                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F10938
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                                                                                                                                      • String ID: H
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: bf5ae7d5676c55c03b1a017af04aa30116dc26f1cc0522b919d5bde44b0130a4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 30ec62326357c2735b464c7689ca00a2a3685b12ff0e9b329ee5766997e52f0f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bf5ae7d5676c55c03b1a017af04aa30116dc26f1cc0522b919d5bde44b0130a4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F1A11632A041088FDF19AF68DC51BEE7BA0EF46320F140159F855AB3D1DB759C92EB91

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00FA1418,?,00ED2E7F,?,?,?,00000000), ref: 00ED3A78
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00ED3379
                                                                                                                                                                                                                                                                                                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00ED356A
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F1318D
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F131CE
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00F13210
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F13277
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F13286
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                                                                                                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f9440f6c363d60a8d374d469973c2eb4352ec9d7a33803c1245e63007c9b22a6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a4137bda74126e47c7f5ae2e34fe3c4db52471bf934b1cca7435c4aef637ea37
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f9440f6c363d60a8d374d469973c2eb4352ec9d7a33803c1245e63007c9b22a6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F871E6B16043049FC744EF69DC419ABBBE8FF87740F40142EF584932A1EB749A49EB52

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00ED2B8E
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00ED2B9D
                                                                                                                                                                                                                                                                                                                                                      • LoadIconW.USER32(00000063), ref: 00ED2BB3
                                                                                                                                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A4), ref: 00ED2BC5
                                                                                                                                                                                                                                                                                                                                                      • LoadIconW.USER32(000000A2), ref: 00ED2BD7
                                                                                                                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00ED2BEF
                                                                                                                                                                                                                                                                                                                                                      • RegisterClassExW.USER32(?), ref: 00ED2C40
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED2CD4: GetSysColorBrush.USER32(0000000F), ref: 00ED2D07
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED2CD4: RegisterClassExW.USER32(00000030), ref: 00ED2D31
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00ED2D42
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00ED2D5F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00ED2D6F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED2CD4: LoadIconW.USER32(000000A9), ref: 00ED2D85
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00ED2D94
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: bda8a68fd231681fd465f5a5ad3532d20bdecd6ce76c386d2daeb4eda8041c58
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5a881aafdd05fe3bec2bab2921c3f54809955768ec0fa832f92c02bcf11405e0
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bda8a68fd231681fd465f5a5ad3532d20bdecd6ce76c386d2daeb4eda8041c58
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 362129B4E0032CAFDF109FA5EC55AAA7FF8FB49B50F05001AE644A66A0D7F10940EF90

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 598 ed3170-ed3185 599 ed31e5-ed31e7 598->599 600 ed3187-ed318a 598->600 599->600 601 ed31e9 599->601 602 ed318c-ed3193 600->602 603 ed31eb 600->603 604 ed31d0-ed31d8 DefWindowProcW 601->604 607 ed3199-ed319e 602->607 608 ed3265-ed326d PostQuitMessage 602->608 605 f12dfb-f12e23 call ed18e2 call eee499 603->605 606 ed31f1-ed31f6 603->606 615 ed31de-ed31e4 604->615 644 f12e28-f12e2f 605->644 610 ed321d-ed3244 SetTimer RegisterWindowMessageW 606->610 611 ed31f8-ed31fb 606->611 613 ed31a4-ed31a8 607->613 614 f12e7c-f12e90 call f3bf30 607->614 609 ed3219-ed321b 608->609 609->615 610->609 619 ed3246-ed3251 CreatePopupMenu 610->619 616 ed3201-ed320f KillTimer call ed30f2 611->616 617 f12d9c-f12d9f 611->617 620 ed31ae-ed31b3 613->620 621 f12e68-f12e72 call f3c161 613->621 614->609 639 f12e96 614->639 634 ed3214 call ed3c50 616->634 623 f12da1-f12da5 617->623 624 f12dd7-f12df6 MoveWindow 617->624 619->609 628 ed31b9-ed31be 620->628 629 f12e4d-f12e54 620->629 635 f12e77 621->635 631 f12da7-f12daa 623->631 632 f12dc6-f12dd2 SetFocus 623->632 624->609 637 ed31c4-ed31ca 628->637 638 ed3253-ed3263 call ed326f 628->638 629->604 633 f12e5a-f12e63 call f30ad7 629->633 631->637 640 f12db0-f12dc1 call ed18e2 631->640 632->609 633->604 634->609 635->609 637->604 637->644 638->609 639->604 640->609 644->604 648 f12e35-f12e48 call ed30f2 call ed3837 644->648 648->604
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00ED316A,?,?), ref: 00ED31D8
                                                                                                                                                                                                                                                                                                                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,00ED316A,?,?), ref: 00ED3204
                                                                                                                                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00ED3227
                                                                                                                                                                                                                                                                                                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00ED316A,?,?), ref: 00ED3232
                                                                                                                                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 00ED3246
                                                                                                                                                                                                                                                                                                                                                      • PostQuitMessage.USER32(00000000), ref: 00ED3267
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                                                                                                                                      • String ID: TaskbarCreated
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: db882ac473b3cfef45c293664a6a1fa11ffd6bb26f8907f49952c6bafb4fd387
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 28b290a937d1a4f10baaf3091a29a2ae6abfc5a498a4c982acb353257063d01a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: db882ac473b3cfef45c293664a6a1fa11ffd6bb26f8907f49952c6bafb4fd387
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 39416B79A00209ABDF141FB8DC19BBA3A59F706354F042127F591A53F2C7B19A42F7A3

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 654 ed1410-ed1449 655 ed144f-ed1465 mciSendStringW 654->655 656 f124b8-f124b9 DestroyWindow 654->656 657 ed146b-ed1473 655->657 658 ed16c6-ed16d3 655->658 661 f124c4-f124d1 656->661 657->661 662 ed1479-ed1488 call ed182e 657->662 659 ed16f8-ed16ff 658->659 660 ed16d5-ed16f0 UnregisterHotKey 658->660 659->657 664 ed1705 659->664 660->659 663 ed16f2-ed16f3 call ed10d0 660->663 665 f12500-f12507 661->665 666 f124d3-f124d6 661->666 673 ed148e-ed1496 662->673 674 f1250e-f1251a 662->674 663->659 664->658 665->661 670 f12509 665->670 671 f124e2-f124e5 FindClose 666->671 672 f124d8-f124e0 call ed6246 666->672 670->674 675 f124eb-f124f8 671->675 672->675 677 ed149c-ed14c1 call edcfa0 673->677 678 f12532-f1253f 673->678 680 f12524-f1252b 674->680 681 f1251c-f1251e FreeLibrary 674->681 675->665 679 f124fa-f124fb call f432b1 675->679 691 ed14f8-ed1503 CoUninitialize 677->691 692 ed14c3 677->692 686 f12541-f1255e VirtualFree 678->686 687 f12566-f1256d 678->687 679->665 680->674 685 f1252d 680->685 681->680 685->678 686->687 690 f12560-f12561 call f43317 686->690 687->678 688 f1256f 687->688 694 f12574-f12578 688->694 690->687 691->694 696 ed1509-ed150e 691->696 695 ed14c6-ed14f6 call ed1a05 call ed19ae 692->695 694->696 697 f1257e-f12584 694->697 695->691 699 f12589-f12596 call f432eb 696->699 700 ed1514-ed151e 696->700 697->696 713 f12598 699->713 703 ed1524-ed152f call ed988f 700->703 704 ed1707-ed1714 call eef80e 700->704 714 ed1535 call ed1944 703->714 704->703 715 ed171a 704->715 717 f1259d-f125bf call eefdcd 713->717 716 ed153a-ed15a5 call ed17d5 call eefe14 call ed177c call ed988f call edcfa0 call ed17fe call eefe14 714->716 715->704 716->717 743 ed15ab-ed15cf call eefe14 716->743 723 f125c1 717->723 725 f125c6-f125e8 call eefdcd 723->725 731 f125ea 725->731 734 f125ef-f12611 call eefdcd 731->734 740 f12613 734->740 744 f12618-f12625 call f364d4 740->744 743->725 749 ed15d5-ed15f9 call eefe14 743->749 750 f12627 744->750 749->734 755 ed15ff-ed1619 call eefe14 749->755 752 f1262c-f12639 call eeac64 750->752 758 f1263b 752->758 755->744 760 ed161f-ed1643 call ed17d5 call eefe14 755->760 761 f12640-f1264d call f43245 758->761 760->752 769 ed1649-ed1651 760->769 767 f1264f 761->767 771 f12654-f12661 call f432cc 767->771 769->761 770 ed1657-ed1668 call ed988f call ed190a 769->770 778 ed166d-ed1675 770->778 777 f12663 771->777 780 f12668-f12675 call f432cc 777->780 778->771 779 ed167b-ed1689 778->779 779->780 782 ed168f-ed16c5 call ed988f * 3 call ed1876 779->782 785 f12677 780->785 785->785
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00ED1459
                                                                                                                                                                                                                                                                                                                                                      • CoUninitialize.COMBASE ref: 00ED14F8
                                                                                                                                                                                                                                                                                                                                                      • UnregisterHotKey.USER32(?), ref: 00ED16DD
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00F124B9
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?), ref: 00F1251E
                                                                                                                                                                                                                                                                                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F1254B
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: close all
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: aedb317c05206f1ec46fc6da3243de230b6603dc63a7d2eafab8812b1883d0c9
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b8ddf9957aa5afc9dcea200ece9c4323ddff562e7f752f9c4f4b5588fa2dccbb
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aedb317c05206f1ec46fc6da3243de230b6603dc63a7d2eafab8812b1883d0c9
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AFD178317012129FCB19EF55C895A69F7A1FF05710F1451AEE48A7B362CB30AD62DF90

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 803 ed2c63-ed2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00ED2C91
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00ED2CB2
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00ED1CAD,?), ref: 00ED2CC6
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00ED1CAD,?), ref: 00ED2CCF
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$CreateShow
                                                                                                                                                                                                                                                                                                                                                      • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b752f239e2aba365d7efdf5d34bb03210d0d6664fcb4f1468b801b3603b1714a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: da46b137d82dbfe9c7d08e46bd44e6a830a21fd04f9d693b5bd37a0788389e4f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b752f239e2aba365d7efdf5d34bb03210d0d6664fcb4f1468b801b3603b1714a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D7F0D0B55403987AEB311B176C08E773E7DE7C7F60F01005AF94093560C6A65850FAB0

                                                                                                                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                                                                                                                      control_flow_graph 954 ed3b1c-ed3b27 955 ed3b99-ed3b9b 954->955 956 ed3b29-ed3b2e 954->956 958 ed3b8c-ed3b8f 955->958 956->955 957 ed3b30-ed3b48 RegOpenKeyExW 956->957 957->955 959 ed3b4a-ed3b69 RegQueryValueExW 957->959 960 ed3b6b-ed3b76 959->960 961 ed3b80-ed3b8b RegCloseKey 959->961 962 ed3b78-ed3b7a 960->962 963 ed3b90-ed3b97 960->963 961->958 964 ed3b7e 962->964 963->964 964->961
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00ED3B0F,SwapMouseButtons,00000004,?), ref: 00ED3B40
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00ED3B0F,SwapMouseButtons,00000004,?), ref: 00ED3B61
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00ED3B0F,SwapMouseButtons,00000004,?), ref: 00ED3B83
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                                                                                                                                      • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d17665a55fc4710f1e6ae943ca658831537d73147829f6d2dea3ba5943510d51
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 35920966e5ede36dc31b62f969bccb0028282c7ec34538caabf1b758f06e8fb6
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d17665a55fc4710f1e6ae943ca658831537d73147829f6d2dea3ba5943510d51
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A7112AB5510208FFDB208FA5DC44AEEBBB9EF04744B10546BE845E7210D2719E41A7A1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F133A2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00ED3A04
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: Line:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 04dca192435552c4fa7ea7aba6ffff2c4b2e9b3ea2d0af84ef69d0227fa500f8
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8c5b643ac63578b4b19d3bd0113f4d2773fe0866740e4e1eb557b722fcbadff0
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 04dca192435552c4fa7ea7aba6ffff2c4b2e9b3ea2d0af84ef69d0227fa500f8
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4D31E571508304AAD724EB20DC45BEB73D8EB85714F00652BF599A2291DB709A4AD7D3
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00EF0668
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF32A4: RaiseException.KERNEL32(?,?,?,00EF068A,?,00FA1444,?,?,?,?,?,?,00EF068A,00ED1129,00F98738,00ED1129), ref: 00EF3304
                                                                                                                                                                                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00EF0685
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                                                                                                                                      • String ID: Unknown exception
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7fa5326ecc479245e1a746bfe6ab32bf11a9c0a0ccfef49ce52a95c9b9641a71
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 7813f1b3935daeb3e23f7c2eea9a08c68edaec5a612f2806ffafec034ec01ef7
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7fa5326ecc479245e1a746bfe6ab32bf11a9c0a0ccfef49ce52a95c9b9641a71
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 86F0C23490020D778F10BAB5EC46DBE7BAC5E40354B606131FA18F69E3EF71EA26C681
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00ED1BF4
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00ED1BFC
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00ED1C07
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00ED1C12
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00ED1C1A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00ED1C22
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED1B4A: RegisterWindowMessageW.USER32(00000004,?,00ED12C4), ref: 00ED1BA2
                                                                                                                                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00ED136A
                                                                                                                                                                                                                                                                                                                                                      • OleInitialize.OLE32 ref: 00ED1388
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 00F124AB
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1986988660-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f12d5740574f7ef0f97172b5989b0f9f7673a2d0b9772ae36e6639fdbf63358d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 2e9c35cca7e81863de44a73b2afc23ff67783ed1eaa658eb4d9406a51f689d75
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f12d5740574f7ef0f97172b5989b0f9f7673a2d0b9772ae36e6639fdbf63358d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A971ABF8D112188EC388EF79AD456653BE0FB8B384F1A922AD45AD7362EB344445FF50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00ED3A04
                                                                                                                                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F3C259
                                                                                                                                                                                                                                                                                                                                                      • KillTimer.USER32(?,00000001,?,?), ref: 00F3C261
                                                                                                                                                                                                                                                                                                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F3C270
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3500052701-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4e1818bada5559bb1dad574d75a7ebb025e111636feee46549e71c8c89ebf314
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 98ca0f8dafb94404680100fa74f7219a2bfba50c69e76088f0af10512f23f645
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4e1818bada5559bb1dad574d75a7ebb025e111636feee46549e71c8c89ebf314
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8D31C571904344AFEB32DF748855BE7BBECAB06314F00049ED2EAA7241C7745A84EB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,00F085CC,?,00F98CC8,0000000C), ref: 00F08704
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00F085CC,?,00F98CC8,0000000C), ref: 00F0870E
                                                                                                                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F08739
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2583163307-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 569334a323e4c01e2633bef8c8768795dce0acbd555c9eae6fcbbdea649670b7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ac937184b03792d2a00609b4fca7fa2022481aee0a42d6fadc81d7584d368094
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 569334a323e4c01e2633bef8c8768795dce0acbd555c9eae6fcbbdea649670b7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 43014E33E056641AD6246334AC4577F7B4A4B92BF4F3A0119F8989B1D3DEE6CC83B690
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 00EDDB7B
                                                                                                                                                                                                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 00EDDB89
                                                                                                                                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EDDB9F
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNELBASE(0000000A), ref: 00EDDBB1
                                                                                                                                                                                                                                                                                                                                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00F21CC9
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3288985973-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: de47a08f8a22359b227ff0c56194100629453b387f3245b05841326e13bbec97
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 639ef241d22202a6caee2a433e8881635eeeb372870da63d33b8c86a8a622449
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: de47a08f8a22359b227ff0c56194100629453b387f3245b05841326e13bbec97
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B7F082306483889BE734CB70DC49FEA73ACFB45314F10461AE69AD71C0DB749449EB55
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00EE17F6
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                                                                                                                                                                                                      • String ID: CALL
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0e1f21466c2620c5ef097ef6d15abd2421b885e34a4fb5c1c4cba38d302120c9
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 27e1c6fd8adc6dea3f0b1b833000f773c61f9cf0a3d735c86ae7aac25b012273
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0e1f21466c2620c5ef097ef6d15abd2421b885e34a4fb5c1c4cba38d302120c9
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6229D706083859FC714DF15C880B2ABBF1BF85314F18999DF496AB3A1D731E885DB82
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00F12C8C
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED3A97,?,?,00ED2E7F,?,?,?,00000000), ref: 00ED3AC2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00ED2DC4
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                                                                                                                                      • String ID: X
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 779396738-3081909835
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 93c233d3e2a57f9787d7cdcb66e0e0ab7c5efbcea6745d5e1ee5718a97dc1b7f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8f16961d6a2bc79bb9ddd2832bcfac6a441b5d217da01adbc4799244590072aa
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 93c233d3e2a57f9787d7cdcb66e0e0ab7c5efbcea6745d5e1ee5718a97dc1b7f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5A218171A002589BDF41EF94C845BEE7BF8EF49314F00805AE545F7341DBB45A8A9BA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00ED3908
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1144537725-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ecfd0b8b6d3d4c42b50727488ecafc32bd4bd9ad059ebb9cd1fdb0836a242a3d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c6026e7d1e66eca36e053f470e0669e60600b2dd93b249b327564beb24f31862
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ecfd0b8b6d3d4c42b50727488ecafc32bd4bd9ad059ebb9cd1fdb0836a242a3d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E83180B49043059FD720DF34D88579BBBE4FB49718F00092EF5A9A7390E7B1AA44DB52
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • timeGetTime.WINMM ref: 00EEF661
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EDD730: GetInputState.USER32 ref: 00EDD807
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 00F2F2DE
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4149333218-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0a207d7f49aa8e3461dd73178a961c1f0157bc7dbcc716aac69814effeb87b23
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 89ef7aed5d4b1e6c03edfb704d63da2aa26adc334b2d9cd507059995df81759a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0a207d7f49aa8e3461dd73178a961c1f0157bc7dbcc716aac69814effeb87b23
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BEF0A731240205DFD310EF75E445B6AB7F9FF46760F00002AE899D7361DB70A800CB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00ED4EDD,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E9C
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00ED4EAE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED4E90: FreeLibrary.KERNEL32(00000000,?,?,00ED4EDD,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4EC0
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4EFD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F13CDE,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E62
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00ED4E74
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED4E59: FreeLibrary.KERNEL32(00000000,?,?,00F13CDE,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E87
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2632591731-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b819e5d05b00d15e4ab15436fc6fd7a09fc9d8c1bb1c4fbc0fc4a7b12331b236
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 4175ca03a55af45c397abe26221549e4e004c4541d71944d5a6068baf4ed3100
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b819e5d05b00d15e4ab15436fc6fd7a09fc9d8c1bb1c4fbc0fc4a7b12331b236
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2411E372700205ABCB14AF60DC06FED77E5EF60710F10942FF582BA2E1EE709A46A790
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: __wsopen_s
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3347428461-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6cfd2d44fac543b976c58c0512b3e24e468bb5489b5055c532f5afc232dc50ac
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 424dc775bc38a773b005005ec2e01a2879445bb4f800ede9b60f55b41c5bfa8a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6cfd2d44fac543b976c58c0512b3e24e468bb5489b5055c532f5afc232dc50ac
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EE11187590410AAFCB05DF58E9419DE7BF5EF48354F104059F808AB352DA31DA12EBA5
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F04C7D: RtlAllocateHeap.NTDLL(00000008,00ED1129,00000000,?,00F02E29,00000001,00000364,?,?,?,00EFF2DE,00F03863,00FA1444,?,00EEFDF5,?), ref: 00F04CBE
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0506C
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AllocateHeap_free
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 614378929-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: cc1b49b7f04f29951b7fb1dbc209fe0a4486a168f5f23f69867e2a81f619ae61
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 030126726047056BE3318E699C85A5AFBECFB89370F65091DE184832C0EA70A805EAB4
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f625f919e02dc374723603e98d465f5e489be8b7afcb919c07b0f423b462a72c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CCF04932500A1C96C6313E698C05BBA33D88F52334F110715F625F62E1CF78B802A5A5
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000008,00ED1129,00000000,?,00F02E29,00000001,00000364,?,?,?,00EFF2DE,00F03863,00FA1444,?,00EEFDF5,?), ref: 00F04CBE
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: fd81241f6f0747b79293885ce13b2ce8abe2234e5563a21d2bf2e64ee2d0610e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 553b690ecd244ec7071d8acb19f307e2bcb5b36e03a78c094eb67f62ee1bde71
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fd81241f6f0747b79293885ce13b2ce8abe2234e5563a21d2bf2e64ee2d0610e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 62F0BBB2A0222867FB215F629C05B6B37C8BF41770F15C111FA15A61D1CA70F80075E0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 46b049798b2883fa3d242fb048b5d3d12e927b772876eea333c79a2df9b281b0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 2574cc4712d94eb83b2e6f43e8826c34448352adb68926d7f69481d98ff3f8fe
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 46b049798b2883fa3d242fb048b5d3d12e927b772876eea333c79a2df9b281b0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A0E02B3390022857EB312A779C00BAB37CCAF437B0F0A81A0FD55A64D1CB21DE01B1E0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4F6D
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FreeLibrary
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3664257935-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 58fff76834afb2e70af767bcb84b75ecd202a83ee470d162fdc33ef4b4a3f6b0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6822409b116a8c98435585aaada62bb5c50728f4d1643af269b96315d651e41e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 58fff76834afb2e70af767bcb84b75ecd202a83ee470d162fdc33ef4b4a3f6b0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FEF01CB1205755CFDB349F64D490862BBE4FF24319310A96FE1EAA2661C7319845DB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • IsWindow.USER32(00000000), ref: 00F62A66
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2353593579-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1d393a0a0c4dfd29a45f86d05cedde247f805d6a32fb9338635c00319a69ffbc
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8e6d10a421e7f75ebf343ba08a78ddd33cba40fc52cd8527604bd46f6b14f3a1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1d393a0a0c4dfd29a45f86d05cedde247f805d6a32fb9338635c00319a69ffbc
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 58E02636750516AAC750EB70DC809FE775CEF103A0B000536FC2AC2100DF7CA991B2E0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00ED314E
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1144537725-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 19fe1cebd552af3511bac8ca515b241abf7972340bdbd6114c11a9fe632acd59
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: bdbbb8933e4c39621a9f3b96ad5cd995d7b9eb834f0083c88daa473b222165f2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 19fe1cebd552af3511bac8ca515b241abf7972340bdbd6114c11a9fe632acd59
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0CF012B09143589FEB52DF24DC457967ABCB701708F0001E9A698A6291DBB45788CB51
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00ED2DC4
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 541455249-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: dd4ecf0022001e6c28ac143df7695545873c20d86617a7af59cf09c5fd28357d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a01ca89c44b58bb9673c3db0d5f4c85dd0cebaa84d69365ec24ab2d06b53bf26
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dd4ecf0022001e6c28ac143df7695545873c20d86617a7af59cf09c5fd28357d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0AE0CD726041245BC710A2589C05FEA77DDDFC8790F050072FD49E7248D964AD818590
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00ED3908
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EDD730: GetInputState.USER32 ref: 00EDD807
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00ED2B6B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00ED314E
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3667716007-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ad24097306f56ae216de47a6515a78de71d5a0c306b89662652eea0e66b83e86
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9b90211daf93848637a4e1c615da02674d861a5a820813bdc8a5373ab2a6765b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ad24097306f56ae216de47a6515a78de71d5a0c306b89662652eea0e66b83e86
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B5E0262530420802C608BB34AC1247DB7C9DBD7351F00343FF182A33A3CE6449475252
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateFileW.KERNELBASE(00000000,00000000,?,00F10704,?,?,00000000,?,00F10704,00000000,0000000C), ref: 00F103B7
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CreateFile
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 823142352-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f5f597c94d64ed86dec790e0bf43e6e11c5272b878521d46e8eeb4b07dfced82
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d7bd6cf491cfb52681c7c0db993bd9af4dd2a4a49e6b80b0f43dbd18c7a1a71f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f5f597c94d64ed86dec790e0bf43e6e11c5272b878521d46e8eeb4b07dfced82
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 39D06C3204010DBBDF028F84DD06EDA3BAAFB48714F014100FE5856020C772E821AB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00ED1CBC
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: InfoParametersSystem
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3098949447-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5e89ab1e56213334519c2da430345352695fed7da87820fdc42335a722571e83
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d5ab5a1d2b36b91077655f1583546087d558803c5ba1d9dc9b9ecd915d2a3551
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e89ab1e56213334519c2da430345352695fed7da87820fdc42335a722571e83
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5CC09B7538030C9FF6144B84BC4AF107754B349B10F084001F659555E3C7E11810FA90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00F6961A
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F6965B
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00F6969F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F696C9
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00F696F2
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 00F6978B
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000009), ref: 00F69798
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F697AE
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000010), ref: 00F697B8
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F697E9
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00F69810
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001030,?,00F67E95), ref: 00F69918
                                                                                                                                                                                                                                                                                                                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00F6992E
                                                                                                                                                                                                                                                                                                                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00F69941
                                                                                                                                                                                                                                                                                                                                                      • SetCapture.USER32(?), ref: 00F6994A
                                                                                                                                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 00F699AF
                                                                                                                                                                                                                                                                                                                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00F699BC
                                                                                                                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F699D6
                                                                                                                                                                                                                                                                                                                                                      • ReleaseCapture.USER32 ref: 00F699E1
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F69A19
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F69A26
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F69A80
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00F69AAE
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F69AEB
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00F69B1A
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00F69B3B
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00F69B4A
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F69B68
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F69B75
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00F69B93
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F69BFA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00F69C2B
                                                                                                                                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 00F69C84
                                                                                                                                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00F69CB4
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F69CDE
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32 ref: 00F69D01
                                                                                                                                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 00F69D4E
                                                                                                                                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00F69D82
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9944: GetWindowLongW.USER32(?,000000EB), ref: 00EE9952
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F69E05
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                                                                                                                                                      • String ID: @GUI_DRAGID$F
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3429851547-4164748364
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: bb3d63dc8e3bf732e4ff39423826ffb2421cd04b60a32e9ffb292a482663837f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c253acd35ecbce4af3101d34ff25806f4611a6c76f7a82770662fbdb80e87361
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bb3d63dc8e3bf732e4ff39423826ffb2421cd04b60a32e9ffb292a482663837f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9642A075608305AFD724CF28CC44AAABBE9FF49320F14061DF5A9972A1D7B2D850EF91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00F648F3
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00F64908
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00F64927
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00F6494B
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00F6495C
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00F6497B
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00F649AE
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00F649D4
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00F64A0F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F64A56
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F64A7E
                                                                                                                                                                                                                                                                                                                                                      • IsMenu.USER32(?), ref: 00F64A97
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F64AF2
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F64B20
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F64B94
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00F64BE3
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00F64C82
                                                                                                                                                                                                                                                                                                                                                      • wsprintfW.USER32 ref: 00F64CAE
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F64CC9
                                                                                                                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F64CF1
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F64D13
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F64D33
                                                                                                                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F64D5A
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                                                                                                                                                      • String ID: %d/%02d/%02d
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4054740463-328681919
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d2225e7a35c4710f668f0e7e0458bc80ed00f6b1b2b5e0cbbd149e021fa8b4a4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 04afc74a1814f7377557862794592c77dd5e0a9595ff2aa08fcd931daee1a37c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d2225e7a35c4710f668f0e7e0458bc80ed00f6b1b2b5e0cbbd149e021fa8b4a4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 97122471900248ABEB24AF24DC49FBE7BF8EF45720F104119F565EB2E1DBB4A941EB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00EEF998
                                                                                                                                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F2F474
                                                                                                                                                                                                                                                                                                                                                      • IsIconic.USER32(00000000), ref: 00F2F47D
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000000,00000009), ref: 00F2F48A
                                                                                                                                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 00F2F494
                                                                                                                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F2F4AA
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00F2F4B1
                                                                                                                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F2F4BD
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F2F4CE
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F2F4D6
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00F2F4DE
                                                                                                                                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 00F2F4E1
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F2F4F6
                                                                                                                                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 00F2F501
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F2F50B
                                                                                                                                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 00F2F510
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F2F519
                                                                                                                                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 00F2F51E
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F2F528
                                                                                                                                                                                                                                                                                                                                                      • keybd_event.USER32(00000012,00000000), ref: 00F2F52D
                                                                                                                                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 00F2F530
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00F2F557
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ac1bc0a9892532a56ea8e30ccdbf005044f3abe9192b1897d5a2b9326a49a335
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c8ec75ae63c213d35749b1cd200452f24548a8acaeb4abcefb8e1ef6537e5982
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ac1bc0a9892532a56ea8e30ccdbf005044f3abe9192b1897d5a2b9326a49a335
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5A316171A5022CBBEB206BB59C4AFBF7E7CEB44B50F140026FA55E61D1C6F15D00BAA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F3170D
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F3173A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F316C3: GetLastError.KERNEL32 ref: 00F3174A
                                                                                                                                                                                                                                                                                                                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00F31286
                                                                                                                                                                                                                                                                                                                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00F312A8
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F312B9
                                                                                                                                                                                                                                                                                                                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F312D1
                                                                                                                                                                                                                                                                                                                                                      • GetProcessWindowStation.USER32 ref: 00F312EA
                                                                                                                                                                                                                                                                                                                                                      • SetProcessWindowStation.USER32(00000000), ref: 00F312F4
                                                                                                                                                                                                                                                                                                                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F31310
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F311FC), ref: 00F310D4
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310BF: CloseHandle.KERNEL32(?,?,00F311FC), ref: 00F310E9
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                                                                                                                                      • String ID: $default$winsta0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 22674027-1027155976
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4b8ce07487f43bc52d9c2abd074050e5b3976f3c53877801d159e6dd9b959d9f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 2dde216cf817d350fa886bd48f5d487bcb3cf455ace3f7f8b8b72249fbc4af1f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4b8ce07487f43bc52d9c2abd074050e5b3976f3c53877801d159e6dd9b959d9f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95818971900209ABDF21DFA4DC49BFE7BB9FF05720F144129FA61A62A0CB758954EB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F31114
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31120
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F3112F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31136
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F3114D
                                                                                                                                                                                                                                                                                                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F30BCC
                                                                                                                                                                                                                                                                                                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F30C00
                                                                                                                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00F30C17
                                                                                                                                                                                                                                                                                                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00F30C51
                                                                                                                                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F30C6D
                                                                                                                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00F30C84
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F30C8C
                                                                                                                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00F30C93
                                                                                                                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F30CB4
                                                                                                                                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000), ref: 00F30CBB
                                                                                                                                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F30CEA
                                                                                                                                                                                                                                                                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F30D0C
                                                                                                                                                                                                                                                                                                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F30D1E
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30D45
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F30D4C
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30D55
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F30D5C
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30D65
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F30D6C
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00F30D78
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F30D7F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31193: GetProcessHeap.KERNEL32(00000008,00F30BB1,?,00000000,?,00F30BB1,?), ref: 00F311A1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F30BB1,?), ref: 00F311A8
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F30BB1,?), ref: 00F311B7
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4175595110-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6d9ebe83db77d4bceb9ea8380ecd2fad7a5207ff0bef3b20d0b4ab788449a38b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: de9bf75b9ba808494629246c459ec5b7d5212c06b0b8650efea98895c6fc66ce
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6d9ebe83db77d4bceb9ea8380ecd2fad7a5207ff0bef3b20d0b4ab788449a38b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5F715B72D0020ABBDF10DFA5DC44FAEBBB8BF05320F044556E954E7191DBB5A905EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • OpenClipboard.USER32(00F6CC08), ref: 00F4EB29
                                                                                                                                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00F4EB37
                                                                                                                                                                                                                                                                                                                                                      • GetClipboardData.USER32(0000000D), ref: 00F4EB43
                                                                                                                                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00F4EB4F
                                                                                                                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00F4EB87
                                                                                                                                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00F4EB91
                                                                                                                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00F4EBBC
                                                                                                                                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00F4EBC9
                                                                                                                                                                                                                                                                                                                                                      • GetClipboardData.USER32(00000001), ref: 00F4EBD1
                                                                                                                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00F4EBE2
                                                                                                                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00F4EC22
                                                                                                                                                                                                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 00F4EC38
                                                                                                                                                                                                                                                                                                                                                      • GetClipboardData.USER32(0000000F), ref: 00F4EC44
                                                                                                                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00F4EC55
                                                                                                                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00F4EC77
                                                                                                                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00F4EC94
                                                                                                                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00F4ECD2
                                                                                                                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00F4ECF3
                                                                                                                                                                                                                                                                                                                                                      • CountClipboardFormats.USER32 ref: 00F4ED14
                                                                                                                                                                                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00F4ED59
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 420908878-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5a0e42a4947b6800ef7b41588d9b099b1f5aac03525cc5f9c23c968928ae7a8e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: af09f56170649d40dc049f1819f6e89c2de891cd241c719e75564b0ecb00d313
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5a0e42a4947b6800ef7b41588d9b099b1f5aac03525cc5f9c23c968928ae7a8e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0361AD356042059FD300EF24D894F3ABBE4FF84714F14551EF8A6972A2CB71E946EBA2
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00F469BE
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F46A12
                                                                                                                                                                                                                                                                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F46A4E
                                                                                                                                                                                                                                                                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F46A75
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F46AB2
                                                                                                                                                                                                                                                                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F46ADF
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a82fed52af8dd731f04854ed0262088804980460c180fefcc72554de2e1ed5e8
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5c329f56e6092732ab65858d91d43d93ce37f606a151afd2df84d036a7d7b74a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a82fed52af8dd731f04854ed0262088804980460c180fefcc72554de2e1ed5e8
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 98D16072508340AEC714EBA0CC91EABB7ECEF88704F44591EF985D7291EB74DA05CB62
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00F49663
                                                                                                                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00F496A1
                                                                                                                                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00F496BB
                                                                                                                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00F496D3
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F496DE
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00F496FA
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00F4974A
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(00F96B7C), ref: 00F49768
                                                                                                                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F49772
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F4977F
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F4978F
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 14ed6efcf0932d1e37208c0b5aa3c8e10c28bca5aa4eb3d74b7b6b9ab093ac32
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b3c5447aec213aa1bb10fe0235662635a2980bd2bac747c8849c9fc8c49eb796
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 14ed6efcf0932d1e37208c0b5aa3c8e10c28bca5aa4eb3d74b7b6b9ab093ac32
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6F31B032B0421D6ADF10EFB4DC09AEF7BAC9F49320F104156EDA5E21A0EBB0DD40AB54
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00F497BE
                                                                                                                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00F49819
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F49824
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00F49840
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00F49890
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(00F96B7C), ref: 00F498AE
                                                                                                                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F498B8
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F498C5
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F498D5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F3DB00
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0f65349d6c1880ac6a901d4684ee69491a8ed12751bb942a361eec3e2a469379
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e06d942e0271081db6d47ed63865d5ae96b87d6999549dff21dc0c0b1136d34b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0f65349d6c1880ac6a901d4684ee69491a8ed12751bb942a361eec3e2a469379
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C231B332A0421D6AEF10EFA8DC49AEF7BAC9F46330F504155ED90E21A1DBB0D944EB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5B6AE,?,?), ref: 00F5C9B5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5C9F1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA68
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA9E
                                                                                                                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5BF3E
                                                                                                                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00F5BFA9
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F5BFCD
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00F5C02C
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00F5C0E7
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F5C154
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F5C1E9
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00F5C23A
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F5C2E3
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F5C382
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F5C38F
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3102970594-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0213e9b5fdef89d59a7e45c9e35e60a25f84920a636a5bfc69c0487137760916
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0874d96cc81f356935c606345a506dd66fa40e3a15c309cbcd53721530363380
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0213e9b5fdef89d59a7e45c9e35e60a25f84920a636a5bfc69c0487137760916
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 89025F71604300AFC714DF24C895E2ABBE5EF89314F18849DF98ADB2A2D731ED46DB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetLocalTime.KERNEL32(?), ref: 00F48257
                                                                                                                                                                                                                                                                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00F48267
                                                                                                                                                                                                                                                                                                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00F48273
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F48310
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48324
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48356
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F4838C
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48395
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1214da62fc491ea9794f5f45ef6aa2af0e2ae96cf8399ac54b374c788bc868fa
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 03b9f8b15804368cb9ac430c743fe3e3176ceb9ca35d681bb87b942aa9326f4f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1214da62fc491ea9794f5f45ef6aa2af0e2ae96cf8399ac54b374c788bc868fa
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A619B725043059FCB10EF60C8409AEB7E8FF89360F04891EF999D7251EB35E906DB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED3A97,?,?,00ED2E7F,?,?,?,00000000), ref: 00ED3AC2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3E199: GetFileAttributesW.KERNEL32(?,00F3CF95), ref: 00F3E19A
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00F3D122
                                                                                                                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00F3D1DD
                                                                                                                                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 00F3D1F0
                                                                                                                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F3D20D
                                                                                                                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F3D237
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00F3D21C,?,?), ref: 00F3D2B2
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 00F3D253
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F3D264
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c2105591492f6289839742f55add3c7f28776b940d69c8029ec9e8d7337877da
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d0ff024fc6a58a8a4addd58000af69edab18c5a974b0f1e98a231c24580f57de
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c2105591492f6289839742f55add3c7f28776b940d69c8029ec9e8d7337877da
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A1618D31D0110D9BCF05EBA0EE929EEB7B5EF55310F244066E44177292EB349F0AEB61
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1737998785-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 42514a2f18123dc22c9a9ba7f6701b32e40093c562fa6ed0d69ad4f02f2481b3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f141ff6d1ddd79fb0f830472c0b6319c94b628fc8c258f4a7335ac3098549c7e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 42514a2f18123dc22c9a9ba7f6701b32e40093c562fa6ed0d69ad4f02f2481b3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D841AE35A04611AFD710DF15D888B69BBE1FF44328F15C099E8A98B762C776EC42DBD0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F3170D
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F3173A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F316C3: GetLastError.KERNEL32 ref: 00F3174A
                                                                                                                                                                                                                                                                                                                                                      • ExitWindowsEx.USER32(?,00000000), ref: 00F3E932
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                                                                                                                                      • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 04f743defd9968c00dc5131269eb0bc7a6249437767a983ecf739888a16995a5
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9550a2b6740f11c68128d61bfde7ab581471422a6934b289aa22029aceca39ed
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 04f743defd9968c00dc5131269eb0bc7a6249437767a983ecf739888a16995a5
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C301D673A12215ABEB6426B49C86BBB725CAF14770F154422FD53E21D1D5A49C40B3D0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00F51276
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F51283
                                                                                                                                                                                                                                                                                                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00F512BA
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F512C5
                                                                                                                                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 00F512F4
                                                                                                                                                                                                                                                                                                                                                      • listen.WSOCK32(00000000,00000005), ref: 00F51303
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F5130D
                                                                                                                                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 00F5133C
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 540024437-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9739ca5a84622ac5085a9b3737e60d4e571227d6b65b26b833806d0e4f004f64
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e4a7b10a9bfff5c8b62a8dda5b54819393d64c70b3aba1c00b98dedbbe635004
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9739ca5a84622ac5085a9b3737e60d4e571227d6b65b26b833806d0e4f004f64
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A0419131A001019FD720DF24C484B29BBE5BF86329F188189D9969F292C775FC86DBE1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED3A97,?,?,00ED2E7F,?,?,?,00000000), ref: 00ED3AC2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3E199: GetFileAttributesW.KERNEL32(?,00F3CF95), ref: 00F3E19A
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00F3D420
                                                                                                                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F3D470
                                                                                                                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F3D481
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F3D498
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F3D4A1
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: cdca38e38b1af4502a09b9ac274f23bfb2aec880e622ee3264ad58159e51a6b4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f3e9a71337e8d80eb6b07885a9558b0800cb6a7bb9ac89fa3b8a702bc7f60738
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cdca38e38b1af4502a09b9ac274f23bfb2aec880e622ee3264ad58159e51a6b4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 303164714083459BC305EF64D8518AF77E8EE91324F44592EF4E193291EB30AA0AE763
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: __floor_pentium4
                                                                                                                                                                                                                                                                                                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5f78d8e42be23ee93d24b2479a346ebd1506d589cae5735562f47b207b85a34f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a1a4bcbbeeb9d41add6420ca4ceb6cac7c8e4dffbe8c624721dcbe61fab681ed
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5f78d8e42be23ee93d24b2479a346ebd1506d589cae5735562f47b207b85a34f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 12C24D72E046298FDB35CE28DD407EAB7B5EB48314F1445EAD84DE7280E774AE85AF40
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F464DC
                                                                                                                                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00F46639
                                                                                                                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(00F6FCF8,00000000,00000001,00F6FB68,?), ref: 00F46650
                                                                                                                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00F468D4
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: .lnk
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 886957087-24824748
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 92946714e012cb64efd40ba946cb9a9110eecc46935ce38c22abbc8b61b323ab
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 19c302408c4200ff657ad144f8180945fe9cace6b5e056a83dc13648460f389a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 92946714e012cb64efd40ba946cb9a9110eecc46935ce38c22abbc8b61b323ab
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 08D149716082019FC304EF24C88196BBBE8FF99704F14496EF595DB292EB70ED06CB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 00F522E8
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F4E4EC: GetWindowRect.USER32(?,?), ref: 00F4E504
                                                                                                                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00F52312
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00F52319
                                                                                                                                                                                                                                                                                                                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00F52355
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F52381
                                                                                                                                                                                                                                                                                                                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F523DF
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2387181109-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c654f7c5a9a4b8a057af13095fc13d6f3e1182417227112cd0299346380bf4d4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8ee3b07138b6ebf8356b57da7597b1b2fcba894ddb10886e16fc1cc49a42ecd1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c654f7c5a9a4b8a057af13095fc13d6f3e1182417227112cd0299346380bf4d4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E631ED72504309ABD720DF54CC48B6BBBA9FF85320F000A19FA9597191DB74EA08DBD2
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00F49B78
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00F49C8B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F43874: GetInputState.USER32 ref: 00F438CB
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F43874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F43966
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00F49BA8
                                                                                                                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00F49C75
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d064faf1bf23dc930d69e175c9438026a5c0114d567129e574fb0d4f6641ff95
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f8524bcb7d3a7ba8dad3083c3045f59747f66b720656dfbcc2c906f9316cf17b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d064faf1bf23dc930d69e175c9438026a5c0114d567129e574fb0d4f6641ff95
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BA41B271E0420A9FCF14DF64CC85AEEBBF4EF45310F204056E955A2291EB709E45EFA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00EE9A4E
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 00EE9B23
                                                                                                                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,00000000), ref: 00EE9B36
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Color$LongProcWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3131106179-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 492dbda806f2ff5b5bf998632253c2e23532196a2bf3289a3b5f700e25ed7ac3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 832de1faef8c07c83eb29c9a7240ffe34aec12a0d38b5d0c349d953e473b6a08
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 492dbda806f2ff5b5bf998632253c2e23532196a2bf3289a3b5f700e25ed7ac3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A4A15B705086ACBEE724AA3E9C58EBB3ADDEF42314F151119F402E7693CB259D01F276
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F5307A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5304E: _wcslen.LIBCMT ref: 00F5309B
                                                                                                                                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00F5185D
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F51884
                                                                                                                                                                                                                                                                                                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00F518DB
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F518E6
                                                                                                                                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 00F51915
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1601658205-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a57d1a56c9ef7964cfc53db8e9759ebe3db670c41669214e91d35e93d45743f1
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 4767b62b1f332b1884c807a686dbac0f9854c4f717cd624e543202d0c54d3aab
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a57d1a56c9ef7964cfc53db8e9759ebe3db670c41669214e91d35e93d45743f1
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BD510471A00200AFDB20AF24C886F6A77E5EB44719F189058FA55AF3C3C770AD42CBE1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 292994002-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 14e7d0fbfcad788e0f00df837e960a10787d695a4f292935b0c2eea6f17e8482
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5349970a1e1452bd2c5398816cd644b4e289e334ab585d961b1e4f2ae5e3717d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 14e7d0fbfcad788e0f00df837e960a10787d695a4f292935b0c2eea6f17e8482
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A021A331B406115FD7209F1AC884BAA7BE5FF95325B1D8059E88ACB351CBB5DC42EB90
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-1546025612
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 751a3279f077c06c2c919966a0e61431c516d8126ea493bd4cdb090ac71b9455
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9feb3a93b2a202ac5642a619a8b99c7052150bea335eec77392db6f12ea65044
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 751a3279f077c06c2c919966a0e61431c516d8126ea493bd4cdb090ac71b9455
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CCA24A71E0021ACBDF24CF58C9407EEB7B1EB94724F2491AAE815A7385DB749DC2DB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00F3AAAC
                                                                                                                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(00000080), ref: 00F3AAC8
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00F3AB36
                                                                                                                                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00F3AB88
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 432972143-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f711ab4c8836d51f54d1964a4a3f6edf50d4ff8cbfd31801c4f6a3f9631de527
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: cc2f040891acc6d38474be7e905ecbf7e8661832b6f279845098ad594f7dad6e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f711ab4c8836d51f54d1964a4a3f6edf50d4ff8cbfd31801c4f6a3f9631de527
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 41311831E40648AEFF35CB66CC05BFABBA6AB84330F04421AF1D5561D1D3B58981E7A2
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0BB7F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                                                                                                                                                                      • GetTimeZoneInformation.KERNEL32 ref: 00F0BB91
                                                                                                                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00FA121C,000000FF,?,0000003F,?,?), ref: 00F0BC09
                                                                                                                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00FA1270,000000FF,?,0000003F,?,?,?,00FA121C,000000FF,?,0000003F,?,?), ref: 00F0BC36
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 806657224-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ba8b10d88945af9f9e09a35df645990da9abc874ded62ff22990603fbee016d1
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6c138b99ade40f8ce70ea29a141d14fe247de13bf07ee079d07d2e735f5a77ee
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ba8b10d88945af9f9e09a35df645990da9abc874ded62ff22990603fbee016d1
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FD31AFB1904249DFDB11DF69CC81A69BBF8FF46360B1586AAE060D72E1D7309D40FB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 00F4CE89
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 00F4CEEA
                                                                                                                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 00F4CEFE
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 234945975-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a5dfaf3f3707376f63b48f2bb7caaeeced154a0f5e8a16278f8d8fde21c8a62c
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 295ce7a3f3b2def96589569669cc4a90e47ee0345c66649407f8f312b32f1092
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a5dfaf3f3707376f63b48f2bb7caaeeced154a0f5e8a16278f8d8fde21c8a62c
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B521A1719013099BD760DF65C944BA77BFCEB40364F10541EEA86E2151E774EE04ABA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00F382AA
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: lstrlen
                                                                                                                                                                                                                                                                                                                                                      • String ID: ($|
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1659193697-1631851259
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a8da95fb8fb998677491da37fd2a3a84d6b9e8a894391c54f9d950ef82658203
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6881395d064329c80f686215c9a4d562f7157a7e32b1c106b25e7a1d46c58819
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a8da95fb8fb998677491da37fd2a3a84d6b9e8a894391c54f9d950ef82658203
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 31323575A007059FCB28CF59C481A6AB7F0FF48760F15856EE49ADB3A1EB74E942CB40
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00F45CC1
                                                                                                                                                                                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00F45D17
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(?), ref: 00F45D5F
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3541575487-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7ed8015c30c7456ae0194b3d33a78b01ce267b382f4db7ccbea44945c23a06f5
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 19985fd236398ffc8da7e598c76f040dfd55902cc393a56373c6b4753e4858b3
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7ed8015c30c7456ae0194b3d33a78b01ce267b382f4db7ccbea44945c23a06f5
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 93519C35A046019FC714DF28C494A9ABBF4FF49324F14855EE99A8B3A2DB30ED05DB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • IsDebuggerPresent.KERNEL32 ref: 00F0271A
                                                                                                                                                                                                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00F02724
                                                                                                                                                                                                                                                                                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00F02731
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3906539128-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 49cbd9a1ae2b67a9b8e6706f9ae412dc2116c4d956277884a6518e7996044cbd
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 583abfb90bea3c4164305215223a5b476a95bad2a5479337fc49212f562bbf44
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 49cbd9a1ae2b67a9b8e6706f9ae412dc2116c4d956277884a6518e7996044cbd
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EF31C47491121C9BCB21DF64DC89798B7B8BF08310F5041EAE91CA6261E7709F819F54
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00F451DA
                                                                                                                                                                                                                                                                                                                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00F45238
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000), ref: 00F452A1
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1682464887-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b9b414a955d0ea4418976dab4ed6fad262f817eab611a8071e619c0b3113f076
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 7fac5f80787a4324f6130929d79918894f5f607a9b094c027fc1448281973a47
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b9b414a955d0ea4418976dab4ed6fad262f817eab611a8071e619c0b3113f076
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1B318035A00508DFDB00DF54D884EADBBF4FF09318F08809AE845AB352DB71E946CB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00EF0668
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00EF0685
                                                                                                                                                                                                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F3170D
                                                                                                                                                                                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F3173A
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F3174A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 577356006-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ea7d0537121ba480aae333f1991134e867a02c6142b9066afcc3141931fb0d7d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 743b8556b32be6467be9e1e6ee25a23542557b299ec9a935bbe590ed90b5244b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ea7d0537121ba480aae333f1991134e867a02c6142b9066afcc3141931fb0d7d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2A11C1B2404309BFD718AF54DC86E6ABBFDFB04764B24852EE09693241EB70BC418A60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00F3D608
                                                                                                                                                                                                                                                                                                                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00F3D645
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00F3D650
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 33631002-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0e29ab10ff8567d919b78903a6a782e911053938b663a8a038d2bb152009cb07
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 44a2b21a087354d8c9fc9dfe2d869f8761fe2714e2806d8f0a597fbe929cd999
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0e29ab10ff8567d919b78903a6a782e911053938b663a8a038d2bb152009cb07
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 86118E71E01228BFDB108F95EC45FAFBBBCEB45B60F108111F914E7290C2B04A059BE1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00F3168C
                                                                                                                                                                                                                                                                                                                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00F316A1
                                                                                                                                                                                                                                                                                                                                                      • FreeSid.ADVAPI32(?), ref: 00F316B1
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3429775523-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 867e6334e15a9a17d39ec3dcee7d02e664083b59ace483b4ac305294c056204d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: dc89ae1cb823f35379f810e18a519fd43ff80b0d6ce2f906dbd6a7952f31a5ac
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 867e6334e15a9a17d39ec3dcee7d02e664083b59ace483b4ac305294c056204d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5FF0447195030CFBDB00DFE08D89AAEBBBCFB08200F404461E940E2180E370AA04AA90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetUserNameW.ADVAPI32(?,?), ref: 00F2D28C
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: NameUser
                                                                                                                                                                                                                                                                                                                                                      • String ID: X64
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0fc0eeeef4d18178d175a99f11f50f32053e2a5034e27a4a75f35794399c124f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 3edea6fba5155dc6f9aac4193e4cfd5a7d58b8e14ec8ba3d00f04c2e535a6e11
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0fc0eeeef4d18178d175a99f11f50f32053e2a5034e27a4a75f35794399c124f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B8D0CAB580512DFACB94CBA0EC88EEAB3BCBB04305F100292F146E2040DB709648AF60
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: bff5b43e16a6fcda3398f4ecf8cb61d1c899a3b007756304f141524d65a5e351
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1E02F872E0021D9BDF14CFA9C9806ADFBF1EF88314F35916AD919B7284D731AA41CB94
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00F46918
                                                                                                                                                                                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00F46961
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2295610775-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6ab3aedd0f396336942ce161a944768cdca7c8cea2432e6a7e0078848f92c4c7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 97c88a1551a22ab6445c03517d4c9bcde31788e5792959ca6b80cc7618cd5939
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6ab3aedd0f396336942ce161a944768cdca7c8cea2432e6a7e0078848f92c4c7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 611190316042019FD710DF29D484A26BBE5FF85328F15C69AE8A99F3A2C770EC45CB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00F54891,?,?,00000035,?), ref: 00F437E4
                                                                                                                                                                                                                                                                                                                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00F54891,?,?,00000035,?), ref: 00F437F4
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3479602957-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 85961e7f1e1fcda8cfb1f87a60786eb211e6651b2bd3d76c2d63dcc0987a50a6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a6d0c08c9906e53dba7da1c46bffa40dbeac5530afeff71e725c18e8bae35718
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 85961e7f1e1fcda8cfb1f87a60786eb211e6651b2bd3d76c2d63dcc0987a50a6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 00F0E5B16052282AE72017668C4EFEB7AAEEFC4761F000165F949E2281D9A09944D6F0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00F3B25D
                                                                                                                                                                                                                                                                                                                                                      • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00F3B270
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3536248340-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 55b4d9a85e04e168b5b4060a8a727da619c1e8e7f7e96e583f47cfbde1103703
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 952e72079c3644e177760e53c95fce53e74d652183a93c28e2bbc6a3a1f8b65f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 55b4d9a85e04e168b5b4060a8a727da619c1e8e7f7e96e583f47cfbde1103703
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 27F01D7180428DABDB059FA1C806BBE7BB4FF04319F04800AF9A5A6192C7B9C611AF94
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F311FC), ref: 00F310D4
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,00F311FC), ref: 00F310E9
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 81990902-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c5d8e4eefda6589e96fa28dd0c42e8de7c458dda7a915727a8bd005c7cdf3378
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0102c58e26963407f72f2cc76c1b2eef562b314fdc49239c7d7d0ac12c392cf4
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c5d8e4eefda6589e96fa28dd0c42e8de7c458dda7a915727a8bd005c7cdf3378
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 49E0BF72018655AEF7252B52FC05F777BE9EB04320F14882DF5E5905B1DBA26C90EB50
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      • Variable is not of type 'Object'., xrefs: 00F20C40
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID: Variable is not of type 'Object'.
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-1840281001
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 2e47a6b7b11a6075075b250757c094ca6cb69b6426cb2f7b35a554df05a0c265
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6356978c7840109be0f4e6c7e91395cbcd7ae3a2c1624ba1272ca80d65769b46
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2e47a6b7b11a6075075b250757c094ca6cb69b6426cb2f7b35a554df05a0c265
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2432AB71A00219DBCF14DF90D880AEDB7B5FF04358F24506AE806BB392DB75AE46DB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00F06766,?,?,00000008,?,?,00F0FEFE,00000000), ref: 00F06998
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ExceptionRaise
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3997070919-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 208570cf1bce4b46bd7d7eb919aa794d48d6a1c54225a6c1bb99091981c8146a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 09868b170a919d9a39bff20d225915c3aa76d70dea8b8a0dd20e54f88c1f3d17
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 208570cf1bce4b46bd7d7eb919aa794d48d6a1c54225a6c1bb99091981c8146a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 44B11A32A106099FDB15CF28C486B657BE0FF45364F25C658E899CF2E2C735E9A1EB40
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-3916222277
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: fd9ce78d3e7e4218576be40bfcb13bf718711269a1f59463d1dc779781af1d59
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: bb6622126a5f623fa322de1fc57f41f1788b2417ebe3c76e55a77172cd065c6c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fd9ce78d3e7e4218576be40bfcb13bf718711269a1f59463d1dc779781af1d59
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 12126D71D002299BCB24CF59D8816EEB7F5FF48710F1481AAE849EB255EB349E81DF90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • BlockInput.USER32(00000001), ref: 00F4EABD
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: BlockInput
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3456056419-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d97f3fa3a15e270877c4908560d9a3404eb899b4684e67f56e9fd6cac4767d0e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 93d6a1cccc02ecb14c94016dd8e2192c68711ba3865e711b15aca7900ffca234
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d97f3fa3a15e270877c4908560d9a3404eb899b4684e67f56e9fd6cac4767d0e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 15E01A322002059FC710EF59D804E9ABBE9FF98760F008416FD49D7361DAB4A8419B90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00EF03EE), ref: 00EF09DA
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3192549508-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 45f41cb9d30a011fcbb4f066444503ea975914218e8277e0bae532daa80a60de
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 181d665e8ec61d74d85bdf618e852c60f624492ff28b67659bac1842816d46ec
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 45f41cb9d30a011fcbb4f066444503ea975914218e8277e0bae532daa80a60de
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-4108050209
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a92c9981514009ed00ebb1a0256099c12046bab7b1ce0c09543b894a5449470e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E51972160CB9D5BDB3C8968895A7FF63D59B82388F583509DBC2F7282C671DE42C352
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: bb65ad41b5de47e9b31795b5b0363023d55b7f1a7ade5d6cfe2e3a5067a985e5
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 56515138ecb8dab8ed2570f08ac05815044e261c72a01b7a6bbcdcf20fa24b25
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bb65ad41b5de47e9b31795b5b0363023d55b7f1a7ade5d6cfe2e3a5067a985e5
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 11325622D29F014DD763A634CC22335A289AFB73D5F24C737F81AB59A6EB29D4C36101
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 74d9813d1a3297711a5693dfb1062004a6f7d5cc841da4cea3a97c90a8ca23b9
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ae184251ea413e7a495cf2e64f13d0e3ef00b07d3bbdd3d5dd44d6900d6dfad3
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 74d9813d1a3297711a5693dfb1062004a6f7d5cc841da4cea3a97c90a8ca23b9
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DB321B32E001A98BCF24CF29D494A7DBBA1EF45314F398566E4599B291D234DD82FB81
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 91a1c9ad2070f32eef68f4e472e857e531dcfb4f5b5ff7373838accedb6bbefb
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9c518917aff2328750d28a62f7badeb6b0b8a6ae7681c69a012e4e329f845b16
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 91a1c9ad2070f32eef68f4e472e857e531dcfb4f5b5ff7373838accedb6bbefb
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F322AD70A00609DFDF14CF65C881AEEB3F2FF84714F14562AE852AB391EB36A951DB50
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f1b680b9dc2d468669172e3f187f7ab44c93cb845fd294ee8ba774c5cf1c473a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: eec44ad9ef0dc50b52eab0484b8b7626b7aeee1232dbe2c948d1d2b4e2e778eb
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f1b680b9dc2d468669172e3f187f7ab44c93cb845fd294ee8ba774c5cf1c473a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 450294B1E00209EBDB04DF65D881AEDB7F5FF44310F108169E816AB391EB35AE51DB91
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e0c41a11f63c016edc9b95aa318eb5e7a6aa0e5c5d57535a829d94830a789736
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d68e92638beea8109fc282dd3242a897d545aba697145df6b585ca7c7f9396ca
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e0c41a11f63c016edc9b95aa318eb5e7a6aa0e5c5d57535a829d94830a789736
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 38B12420D2AF455DD36396398831336B64CAFBB2D5F91D31BFC1A74D62EB2285C36142
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b1f0e59305417244fac54e61223901341bccdf330597436db8af177781387140
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9F9187322080EF8ADB2D463A857407DFFF15A923A631A17DED5F2EA1C5FE20C954D620
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 1e554a8d24fc0899581bc2f37216fc7d6da3e645634ca758d67d7e0418afc29e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 369197732090AB4ADB2D423A843407EFFE15A923A531A17DDD7F2EB1C5EF24C954E620
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c8ee3052a579368caa79b7682c51fe67d8ed0c406831348d572c51526a8bc2e1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CD91B5322090EFCADB2D427A847407DFFE15A923A631A27DED5F2EA1C1FE14C554D620
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8403f338f52c25627e982770ab8ccabe4957e9107acee97cf14fd0dc5e862d24
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 34f76bc9a9ec9898172af6e81ef0f97eeb7ef35f68e169e3279a6c2fe9475481
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8403f338f52c25627e982770ab8ccabe4957e9107acee97cf14fd0dc5e862d24
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7961693120CB0D96EA349A2C8D95BFE63D6DF46748F10391AEBC2FB281D6719E42C355
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 2dbc34f3154470def41ff1d5e99be9abf3fe889dc498ae2000d3fe5789c48d16
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f1aa3a60e105e459b74c25200d02a39518aae88d294e18ebb1dac66cb723b41d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2dbc34f3154470def41ff1d5e99be9abf3fe889dc498ae2000d3fe5789c48d16
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B161453160860D56DE384A285955BFE2389AF8370CF90795EEBC2FB281DA73AD42C255
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f32be379848177f04914006fa322859e0ad3ae6796c7c28f3934791fc7adb1ac
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9681A7336080EF89DB2D423A853407EFFE15A923A531A17DED5F6EB1C1EE24C654E660
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1b818d0d3409f243890469083013c55be23edd88466f56792d28f496bde12825
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 3b4bf5b91dbad763819038f7dc6582a3e51aef366ff12b32c070c5d343f3e23f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1b818d0d3409f243890469083013c55be23edd88466f56792d28f496bde12825
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6921D2727216158BDB28CF7DC82267E77E5A754320F148A2EE4A7C37D0DE39A904DB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00F52B30
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00F52B43
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32 ref: 00F52B52
                                                                                                                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00F52B6D
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00F52B74
                                                                                                                                                                                                                                                                                                                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00F52CA3
                                                                                                                                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00F52CB1
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52CF8
                                                                                                                                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00F52D04
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F52D40
                                                                                                                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52D62
                                                                                                                                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52D75
                                                                                                                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52D80
                                                                                                                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00F52D89
                                                                                                                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52D98
                                                                                                                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00F52DA1
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52DA8
                                                                                                                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00F52DB3
                                                                                                                                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52DC5
                                                                                                                                                                                                                                                                                                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F6FC38,00000000), ref: 00F52DDB
                                                                                                                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00F52DEB
                                                                                                                                                                                                                                                                                                                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00F52E11
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00F52E30
                                                                                                                                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52E52
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F5303F
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                                                                                                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b0261d76fb52950f40ddff1be7e2b79bf3df8ea48454e244aba947706ed2e706
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0c86732f16a87d576cc7ffb8159e6fec78986250b110cc5139c06e68623ffcc0
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b0261d76fb52950f40ddff1be7e2b79bf3df8ea48454e244aba947706ed2e706
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BD028D71A00209EFDB14DF64DC89EAE7BB9FB49311F008219F955AB2A1D770ED05DBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00F6712F
                                                                                                                                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00F67160
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 00F6716C
                                                                                                                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,000000FF), ref: 00F67186
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00F67195
                                                                                                                                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00F671C0
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000010), ref: 00F671C8
                                                                                                                                                                                                                                                                                                                                                      • CreateSolidBrush.GDI32(00000000), ref: 00F671CF
                                                                                                                                                                                                                                                                                                                                                      • FrameRect.USER32(?,?,00000000), ref: 00F671DE
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00F671E5
                                                                                                                                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00F67230
                                                                                                                                                                                                                                                                                                                                                      • FillRect.USER32(?,?,?), ref: 00F67262
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F67284
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: GetSysColor.USER32(00000012), ref: 00F67421
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: SetTextColor.GDI32(?,?), ref: 00F67425
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: GetSysColorBrush.USER32(0000000F), ref: 00F6743B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: GetSysColor.USER32(0000000F), ref: 00F67446
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: GetSysColor.USER32(00000011), ref: 00F67463
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F67471
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: SelectObject.GDI32(?,00000000), ref: 00F67482
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: SetBkColor.GDI32(?,00000000), ref: 00F6748B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: SelectObject.GDI32(?,?), ref: 00F67498
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00F674B7
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F674CE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F673E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00F674DB
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4124339563-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6568d1eabfd714e0b9fcbdd4874005e95e0bb1d9c51a7ef2a2e068b5844771b1
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e59a5af441bd96e5f136d294fa102da0f399903eb12b5e036ae905143d10ae29
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6568d1eabfd714e0b9fcbdd4874005e95e0bb1d9c51a7ef2a2e068b5844771b1
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D2A18072408305AFDB00AF60DC48A6B7BA9FF49324F140A19F9E2961E1D7B5E944EF91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?,?), ref: 00EE8E14
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F26AC5
                                                                                                                                                                                                                                                                                                                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F26AFE
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F26F43
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00EE8BE8,?,00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00EE8FC5
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001053), ref: 00F26F7F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F26F96
                                                                                                                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F26FAC
                                                                                                                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F26FB7
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ef96aeb03ddee60bfe66ad875424115251f06b688c09932458f4bdfa77b3c27e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8b9b506cf418d0cf326ff56afcd3a57384ee107ec0d1ca245aae96a768cbf887
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ef96aeb03ddee60bfe66ad875424115251f06b688c09932458f4bdfa77b3c27e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B12DD30A00269EFDB25DF24ED44BAAB7E1FB49320F144069F499DB261CB31EC51EB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000), ref: 00F5273E
                                                                                                                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F5286A
                                                                                                                                                                                                                                                                                                                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00F528A9
                                                                                                                                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00F528B9
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00F52900
                                                                                                                                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00F5290C
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00F52955
                                                                                                                                                                                                                                                                                                                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F52964
                                                                                                                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00F52974
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00F52978
                                                                                                                                                                                                                                                                                                                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00F52988
                                                                                                                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F52991
                                                                                                                                                                                                                                                                                                                                                      • DeleteDC.GDI32(00000000), ref: 00F5299A
                                                                                                                                                                                                                                                                                                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F529C6
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F529DD
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00F52A1D
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F52A31
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F52A42
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00F52A77
                                                                                                                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00F52A82
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F52A8D
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00F52A97
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                                                                                                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4c3528fb6d0b53670b13550925a2cc1604780e762f33ab7f36ffd712371c9274
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 086d8a2396bc51a819d1b1bdc61b2a0f94656c8f69df283eefb74347129f380e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4c3528fb6d0b53670b13550925a2cc1604780e762f33ab7f36ffd712371c9274
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9AB15CB1A00219AFEB14DFA8DC45EAA7BB9FB09711F004215FA54E7290D7B4ED40DB94
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00F44AED
                                                                                                                                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?,00F6CB68,?,\\.\,00F6CC08), ref: 00F44BCA
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,00F6CB68,?,\\.\,00F6CC08), ref: 00F44D36
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                                                                                                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 01d9a823df652e420ecf56d4943ebdf0770aa93e022fa53bc6a5aaffd09df889
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c28cc5122e4b9ab6f19196f912a5e163628c20aa384997e298705a2221f3ec86
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 01d9a823df652e420ecf56d4943ebdf0770aa93e022fa53bc6a5aaffd09df889
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BD619E31A051069BDF04DB24CAC2B69BBA0EB44355B284016FD16FB6D2EB35FD41BB82
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000012), ref: 00F67421
                                                                                                                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 00F67425
                                                                                                                                                                                                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00F6743B
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 00F67446
                                                                                                                                                                                                                                                                                                                                                      • CreateSolidBrush.GDI32(?), ref: 00F6744B
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000011), ref: 00F67463
                                                                                                                                                                                                                                                                                                                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F67471
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,00000000), ref: 00F67482
                                                                                                                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,00000000), ref: 00F6748B
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00F67498
                                                                                                                                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00F674B7
                                                                                                                                                                                                                                                                                                                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F674CE
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00F674DB
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F6752A
                                                                                                                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00F67554
                                                                                                                                                                                                                                                                                                                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00F67572
                                                                                                                                                                                                                                                                                                                                                      • DrawFocusRect.USER32(?,?), ref: 00F6757D
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000011), ref: 00F6758E
                                                                                                                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00F67596
                                                                                                                                                                                                                                                                                                                                                      • DrawTextW.USER32(?,00F670F5,000000FF,?,00000000), ref: 00F675A8
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00F675BF
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00F675CA
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00F675D0
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00F675D5
                                                                                                                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 00F675DB
                                                                                                                                                                                                                                                                                                                                                      • SetBkColor.GDI32(?,?), ref: 00F675E5
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1996641542-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 993657e12ff87ce1a49ab4091ceb28fa78b8721335adc59a48f4454420f07246
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 95cdae00cf1839c9bba15b8cb1a25b3db2878e2d2f7183473854ca7730b501ef
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 993657e12ff87ce1a49ab4091ceb28fa78b8721335adc59a48f4454420f07246
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B2616E72D00218AFDF01AFA4DC49AAE7FB9EF09320F144115F965AB2A1D7B59D40EF90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F61128
                                                                                                                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00F6113D
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00F61144
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F61199
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00F611B9
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00F611ED
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F6120B
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F6121D
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 00F61232
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00F61245
                                                                                                                                                                                                                                                                                                                                                      • IsWindowVisible.USER32(00000000), ref: 00F612A1
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00F612BC
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00F612D0
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00F612E8
                                                                                                                                                                                                                                                                                                                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00F6130E
                                                                                                                                                                                                                                                                                                                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00F61328
                                                                                                                                                                                                                                                                                                                                                      • CopyRect.USER32(?,?), ref: 00F6133F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 00F613AA
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                                                                                                                                      • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9c04c7663fbbb88e0b2d01831cd60afca18184d327ae90cd14431435d9eec403
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 10616a9f9a3630fd2ced416fc8d683cc2caaf8523b966a9ba805e5d9dbcf92a7
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9c04c7663fbbb88e0b2d01831cd60afca18184d327ae90cd14431435d9eec403
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F5B1BD71604341AFDB00DF64C885B6ABBE4FF88310F04891DF99AAB2A1D771EC45DB96
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00EE8968
                                                                                                                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000007), ref: 00EE8970
                                                                                                                                                                                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00EE899B
                                                                                                                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000008), ref: 00EE89A3
                                                                                                                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 00EE89C8
                                                                                                                                                                                                                                                                                                                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00EE89E5
                                                                                                                                                                                                                                                                                                                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00EE89F5
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00EE8A28
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00EE8A3C
                                                                                                                                                                                                                                                                                                                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00EE8A5A
                                                                                                                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00EE8A76
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00EE8A81
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE912D: GetCursorPos.USER32(?), ref: 00EE9141
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE912D: ScreenToClient.USER32(00000000,?), ref: 00EE915E
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE912D: GetAsyncKeyState.USER32(00000001), ref: 00EE9183
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE912D: GetAsyncKeyState.USER32(00000002), ref: 00EE919D
                                                                                                                                                                                                                                                                                                                                                      • SetTimer.USER32(00000000,00000000,00000028,00EE90FC), ref: 00EE8AA8
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                                                                                                                                      • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5c42a35854cf699ddd9f87f55dffe343147775daa1f2cb2d6588c6d8e34bb507
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ef9c49e6b8bb97d0177b7488b9c381b82cae464bbc08453372fd8d384bec3377
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5c42a35854cf699ddd9f87f55dffe343147775daa1f2cb2d6588c6d8e34bb507
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6FB19B75A0024D9FDB14DFA8DD45BAE3BB4FB48314F114229FA59E7290DB74E840DB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F31114
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31120
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F3112F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31136
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F3114D
                                                                                                                                                                                                                                                                                                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F30DF5
                                                                                                                                                                                                                                                                                                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F30E29
                                                                                                                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00F30E40
                                                                                                                                                                                                                                                                                                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00F30E7A
                                                                                                                                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F30E96
                                                                                                                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00F30EAD
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F30EB5
                                                                                                                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00F30EBC
                                                                                                                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F30EDD
                                                                                                                                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000), ref: 00F30EE4
                                                                                                                                                                                                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F30F13
                                                                                                                                                                                                                                                                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F30F35
                                                                                                                                                                                                                                                                                                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F30F47
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30F6E
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F30F75
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30F7E
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F30F85
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30F8E
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F30F95
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00F30FA1
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F30FA8
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31193: GetProcessHeap.KERNEL32(00000008,00F30BB1,?,00000000,?,00F30BB1,?), ref: 00F311A1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F30BB1,?), ref: 00F311A8
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F30BB1,?), ref: 00F311B7
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4175595110-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 51f9aeb74439b869961610d3ae93862826ad9b4ff286b8ab5bd129d8f9fa0002
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c2b581b5f79184e366df98509d8c16335647d2c528b1c76ecfc62cb8569e429a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 51f9aeb74439b869961610d3ae93862826ad9b4ff286b8ab5bd129d8f9fa0002
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D0715E7290020AEBDF209FA5DC44FEEBBB8FF05720F144116F9A9E6191DB719905DBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5C4BD
                                                                                                                                                                                                                                                                                                                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00F6CC08,00000000,?,00000000,?,?), ref: 00F5C544
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00F5C5A4
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F5C5F4
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F5C66F
                                                                                                                                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00F5C6B2
                                                                                                                                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00F5C7C1
                                                                                                                                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00F5C84D
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00F5C881
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F5C88E
                                                                                                                                                                                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00F5C960
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                                                                                                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 9721498-966354055
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f0aeae479169b6c61d90039661924aa95e2c8be8dcce473794d90aa1d5f246d3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 7c90732ae286da755caa495000f02ab75b192bb3adec16786958c813f63cd6f9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f0aeae479169b6c61d90039661924aa95e2c8be8dcce473794d90aa1d5f246d3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 01127C356043019FD714DF14C881A2AB7E5FF88725F14885DF98AAB3A2DB31ED46DB81
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 00F609C6
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F60A01
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F60A54
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F60A8A
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F60B06
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F60B81
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EEF9F2: _wcslen.LIBCMT ref: 00EEF9FD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F32BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F32BFA
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: cf57a407cddc535183720c080aea4067b6c870e3042e436d34afd0e129dfd5a5
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b5f11303fd24351ea34e4c5c3d82153bb35fb86780fbd90d2fe0fe032efef29b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cf57a407cddc535183720c080aea4067b6c870e3042e436d34afd0e129dfd5a5
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A2E17D326083019FCB14DF64C45092BB7E2FF94364B24895DF896AB3A2DB31ED45EB81
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3eb1e758bed6daea063360a0209dcabb30f6399a109765ec42724434616d05de
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 15a42c97b7e485e5712538318ef69d809dfcc08236e97f0242d6e2d64ba73dfa
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3eb1e758bed6daea063360a0209dcabb30f6399a109765ec42724434616d05de
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E711633A0036A8FCF20DE78CD515BB3791ABA1765B150128FE57A7285E635CD49E3D0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F6835A
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F6836E
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F68391
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F683B4
                                                                                                                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00F683F2
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00F6361A,?), ref: 00F6844E
                                                                                                                                                                                                                                                                                                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F68487
                                                                                                                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00F684CA
                                                                                                                                                                                                                                                                                                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F68501
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(?), ref: 00F6850D
                                                                                                                                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F6851D
                                                                                                                                                                                                                                                                                                                                                      • DestroyIcon.USER32(?), ref: 00F6852C
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00F68549
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00F68555
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                                                                                                                                      • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c25f831aea5cb8ebf27635703ebad5902a6127db4a743e3d675778b38b776dc0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 74678b385eccf1d989c9b986ef05d0f7f4ba2298995b650c6bed0c35f2fbc719
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c25f831aea5cb8ebf27635703ebad5902a6127db4a743e3d675778b38b776dc0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1961DF71900209BAEB14DF64CC41BBE77A8FB04760F10460AF956E61D1EFB4AE81E7A0
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-1645009161
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c116a6141ab8577096fb456156e185171bf3f3c0f975fed9391c6f914753ee63
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 1167e74aad5e89a17e9bac8e8706659affb9e4d20f341153a49ced8dcc0ad10a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c116a6141ab8577096fb456156e185171bf3f3c0f975fed9391c6f914753ee63
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FD810771A04205BBDB21AF60DD42FFE37A4EF95700F045426F945BA292FB70D942E7A1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CharLowerBuffW.USER32(?,?), ref: 00F43EF8
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F43F03
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F43F5A
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F43F98
                                                                                                                                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?), ref: 00F43FD6
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F4401E
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F44059
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F44087
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                                                                                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 55f79e4524c08b1891b88c8c9de0026c3e007aecde347687098a2bc8144422f3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 035388609549f6e695b949d5db4a9f4303f283cd047d24ffd1b08ce6c8bf6940
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 55f79e4524c08b1891b88c8c9de0026c3e007aecde347687098a2bc8144422f3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3271E472A042029FC714DF24C88196ABBF4EF94768F10492DF895E7251E731ED4ADB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadIconW.USER32(00000063), ref: 00F35A2E
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00F35A40
                                                                                                                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00F35A57
                                                                                                                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00F35A6C
                                                                                                                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00F35A72
                                                                                                                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00F35A82
                                                                                                                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00F35A88
                                                                                                                                                                                                                                                                                                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00F35AA9
                                                                                                                                                                                                                                                                                                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00F35AC3
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F35ACC
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F35B33
                                                                                                                                                                                                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00F35B6F
                                                                                                                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00F35B75
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00F35B7C
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00F35BD3
                                                                                                                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00F35BE0
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 00F35C05
                                                                                                                                                                                                                                                                                                                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00F35C2F
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 895679908-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: db0ceaacb9cd0b4a5a799ff8e31125e308fb178dedc7674d64c273cd6da20487
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0285b1c2747aafd5e672e7cba7d0837ef1a4e37c0c3330c321161a5ed7fb37d4
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: db0ceaacb9cd0b4a5a799ff8e31125e308fb178dedc7674d64c273cd6da20487
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0D719031900B09AFDB20DFA8CE45B6EBBF5FF88B24F104518E596A35A0D775E940EB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00F4FE27
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00F4FE32
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00F4FE3D
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00F4FE48
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00F4FE53
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 00F4FE5E
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 00F4FE69
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00F4FE74
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00F4FE7F
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 00F4FE8A
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00F4FE95
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00F4FEA0
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 00F4FEAB
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00F4FEB6
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 00F4FEC1
                                                                                                                                                                                                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00F4FECC
                                                                                                                                                                                                                                                                                                                                                      • GetCursorInfo.USER32(?), ref: 00F4FEDC
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F4FF1E
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3215588206-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: da09a1f25e2396522d7880fc563608efe255d0d1e92906e1eaad401cfade7749
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d6bbde4db04f3e7de044d3b32931d378e9806d88f490ffcfb7a12a77b2f8e3e1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: da09a1f25e2396522d7880fc563608efe255d0d1e92906e1eaad401cfade7749
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FF4154B0D043196BDB109FBA8C8585EBFE8FF04364B54452AE51DEB281DB789905CE91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00EF00C6
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00FA070C,00000FA0,A771A6EC,?,?,?,?,00F123B3,000000FF), ref: 00EF011C
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00F123B3,000000FF), ref: 00EF0127
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00F123B3,000000FF), ref: 00EF0138
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00EF014E
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00EF015C
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00EF016A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00EF0195
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00EF01A0
                                                                                                                                                                                                                                                                                                                                                      • ___scrt_fastfail.LIBCMT ref: 00EF00E7
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00A3: __onexit.LIBCMT ref: 00EF00A9
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      • SleepConditionVariableCS, xrefs: 00EF0154
                                                                                                                                                                                                                                                                                                                                                      • InitializeConditionVariable, xrefs: 00EF0148
                                                                                                                                                                                                                                                                                                                                                      • kernel32.dll, xrefs: 00EF0133
                                                                                                                                                                                                                                                                                                                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00EF0122
                                                                                                                                                                                                                                                                                                                                                      • WakeAllConditionVariable, xrefs: 00EF0162
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                                                                                                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a4e536a06c97184892f9ce4734c9174c7ec46bfaaee265ccb0671f5cb1a42a8f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 57502f9efe00425b4c2493b83a013a4acbb9f1474c9a0bbf7e50f0610bd9ccc9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a4e536a06c97184892f9ce4734c9174c7ec46bfaaee265ccb0671f5cb1a42a8f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F2210B7264575D6BD7106BA4BC05B7A33D4DB06B65F001536F991F3292DFB0EC00AAD1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 176396367-1603158881
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 2bd4f7d2126f074d3d960c1104af83735b18b00245ad418acedeca14f9f830b7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b9cb3b72a801a791c5153dafa50f390a56b8b2fa2a296080d1fda5e4bf19d178
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2bd4f7d2126f074d3d960c1104af83735b18b00245ad418acedeca14f9f830b7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 48E1B232E00516ABDB19DFB8C8517FEBBB0BF54730F54812AE456B7241DB30AE85A790
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CharLowerBuffW.USER32(00000000,00000000,00F6CC08), ref: 00F44527
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F4453B
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F44599
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F445F4
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F4463F
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F446A7
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EEF9F2: _wcslen.LIBCMT ref: 00EEF9FD
                                                                                                                                                                                                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?,00F96BF0,00000061), ref: 00F44743
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                                                                                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1ed50d2644b24ba6691015a135ff2501379b432ea6239faca09053d6a59aa6af
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6120e09cb9b0e373f7a5d7e48a60bc90a61b0e7615c87ab9a2ce44657772c59a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1ed50d2644b24ba6691015a135ff2501379b432ea6239faca09053d6a59aa6af
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F6B1D171A083029BC710DF28C890B6ABBE5FFA5760F54491DF896E7291E730E845DA92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00F6CC08), ref: 00F540BB
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00F540CD
                                                                                                                                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00F6CC08), ref: 00F540F2
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,00F6CC08), ref: 00F5413E
                                                                                                                                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028,?,00F6CC08), ref: 00F541A8
                                                                                                                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(00000009), ref: 00F54262
                                                                                                                                                                                                                                                                                                                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00F542C8
                                                                                                                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 00F542F2
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                                                                                                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 354098117-199464113
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3fd0d6ba4a9111c2a6166ff2e83f4c0e2998dfe652bcc8fb7708d4dd8213d572
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 59b6e78d9d24cca8b5d9a0b384e18a7d2302cd34f16b7dfe26f5fa1f273ee28a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3fd0d6ba4a9111c2a6166ff2e83f4c0e2998dfe652bcc8fb7708d4dd8213d572
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D9125E71A00119EFDB14CF94C884EAEBBB5FF45319F248098EA459B261D731FD86DBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(00FA1990), ref: 00F12F8D
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(00FA1990), ref: 00F1303D
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F13081
                                                                                                                                                                                                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 00F1308A
                                                                                                                                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(00FA1990,00000000,?,00000000,00000000,00000000), ref: 00F1309D
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F130A9
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f81a72acbff591c4c86e0e9dd83a49333256c0a24c916d4c2d3a7eb30d4d32d0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5be93fe1da513a440d94f39779d28c6988f8efc9b4e239624a9625e099b02ca7
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f81a72acbff591c4c86e0e9dd83a49333256c0a24c916d4c2d3a7eb30d4d32d0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 99712C71A44209BEEB218F64CC49FEABF64FF04374F104206F5256A1E0C7B1AD60EB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,?), ref: 00F66DEB
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00F66E5F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00F66E81
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F66E94
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00F66EB5
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00ED0000,00000000), ref: 00F66EE4
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F66EFD
                                                                                                                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00F66F16
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00F66F1D
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F66F35
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00F66F4D
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9944: GetWindowLongW.USER32(?,000000EB), ref: 00EE9952
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: eeb6990b4d05e7793ca6d189b8a06d1e037b0d45e5c39641b1435f04ae9b1d0d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: dcc9e1d808d33b971503c88aec0dc2608658658003b846215eb9e82e2e33ca7f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eeb6990b4d05e7793ca6d189b8a06d1e037b0d45e5c39641b1435f04ae9b1d0d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 24718670504248AFEB20CF18D844FBABBE9FB99314F04041EF999C7261D771E906EB56
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                                                                                                                                                                      • DragQueryPoint.SHELL32(?,?), ref: 00F69147
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F67674: ClientToScreen.USER32(?,?), ref: 00F6769A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F67674: GetWindowRect.USER32(?,?), ref: 00F67710
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F67674: PtInRect.USER32(?,?,00F68B89), ref: 00F67720
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00F691B0
                                                                                                                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00F691BB
                                                                                                                                                                                                                                                                                                                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00F691DE
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00F69225
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00F6923E
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00F69255
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00F69277
                                                                                                                                                                                                                                                                                                                                                      • DragFinish.SHELL32(?), ref: 00F6927E
                                                                                                                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00F69371
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                                                                                                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 221274066-3440237614
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b6e868ff4374c89e6bb12cf6f9082519ea493409d16c5e6ba44b9aeb1218858c
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: fa8eaaaa3e3af55734ae0d71b7dfb550acdcb81d031c1220e95ba4297398e3dd
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b6e868ff4374c89e6bb12cf6f9082519ea493409d16c5e6ba44b9aeb1218858c
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EA618C71108305AFD701EF60DC85DAFBBE8EF89750F10091EF5A5A32A1DB709A49DB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F4C4B0
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00F4C4C3
                                                                                                                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00F4C4D7
                                                                                                                                                                                                                                                                                                                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00F4C4F0
                                                                                                                                                                                                                                                                                                                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00F4C533
                                                                                                                                                                                                                                                                                                                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00F4C549
                                                                                                                                                                                                                                                                                                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F4C554
                                                                                                                                                                                                                                                                                                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F4C584
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00F4C5DC
                                                                                                                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00F4C5F0
                                                                                                                                                                                                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00F4C5FB
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c9c1ac44113580ab6e099c32fbad9d5df4205e9a7ca0f57632f3ad77e91622df
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8dc34aee79f9dd4f40cbecf82b2cf436e56ed6476741bda4db044681d44ed889
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c9c1ac44113580ab6e099c32fbad9d5df4205e9a7ca0f57632f3ad77e91622df
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6E516DB1501208BFDB619F60C948ABB7FFCFF08754F049419F99596210EB74E944ABA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00F68592
                                                                                                                                                                                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00F685A2
                                                                                                                                                                                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00F685AD
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F685BA
                                                                                                                                                                                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00F685C8
                                                                                                                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00F685D7
                                                                                                                                                                                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00F685E0
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F685E7
                                                                                                                                                                                                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00F685F8
                                                                                                                                                                                                                                                                                                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F6FC38,?), ref: 00F68611
                                                                                                                                                                                                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00F68621
                                                                                                                                                                                                                                                                                                                                                      • GetObjectW.GDI32(?,00000018,000000FF), ref: 00F68641
                                                                                                                                                                                                                                                                                                                                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00F68671
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00F68699
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00F686AF
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3840717409-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4960ab8701eeeafe0e783caeee38debc78363fb7bda9aea9ee95b7c3ee120883
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 89825812c10b30f43f621bccc3e10db59b18d6d4050d63204810ebef9841b7bd
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4960ab8701eeeafe0e783caeee38debc78363fb7bda9aea9ee95b7c3ee120883
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 61416C71600208AFDB10DFA5CC48EBA7BB8FF89761F004119F996E7260DB719D01EB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(00000000), ref: 00F41502
                                                                                                                                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(?,?), ref: 00F4150B
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F41517
                                                                                                                                                                                                                                                                                                                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00F415FB
                                                                                                                                                                                                                                                                                                                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00F41657
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00F41708
                                                                                                                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 00F4178C
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F417D8
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F417E7
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(00000000), ref: 00F41823
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                                                                                                                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8453f6d63d5b25b7d719ef37752a2d64dae2f2feb35d373a178d7737c7a9879b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d0f99cfd6c8738795dcbb37fa77eb612752162c3458b33ddb9aaa8604492d6cd
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8453f6d63d5b25b7d719ef37752a2d64dae2f2feb35d373a178d7737c7a9879b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95D1D332A00119DBDB10EF65D885BB9BBF5FF44700F188156E846AB281DB74EC85EBA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5B6AE,?,?), ref: 00F5C9B5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5C9F1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA68
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA9E
                                                                                                                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5B6F4
                                                                                                                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F5B772
                                                                                                                                                                                                                                                                                                                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 00F5B80A
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00F5B87E
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00F5B89C
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00F5B8F2
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F5B904
                                                                                                                                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F5B922
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00F5B983
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F5B994
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                                                                                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c2aefa1871da71e64476ec4d36859b146f1272bf3f8fcdd67e3bb6d6e786f0e2
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 591869343b57793529e6876d37b1fd197a45d074e580dd23ea3c317fae00bb32
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c2aefa1871da71e64476ec4d36859b146f1272bf3f8fcdd67e3bb6d6e786f0e2
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9CC18C30604201AFD710DF14C495F2ABBE1FF84319F18949DE99A9B3A2CB71EC4ADB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00F525D8
                                                                                                                                                                                                                                                                                                                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00F525E8
                                                                                                                                                                                                                                                                                                                                                      • CreateCompatibleDC.GDI32(?), ref: 00F525F4
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00F52601
                                                                                                                                                                                                                                                                                                                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00F5266D
                                                                                                                                                                                                                                                                                                                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00F526AC
                                                                                                                                                                                                                                                                                                                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00F526D0
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00F526D8
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00F526E1
                                                                                                                                                                                                                                                                                                                                                      • DeleteDC.GDI32(?), ref: 00F526E8
                                                                                                                                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,?), ref: 00F526F3
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                                                                                                                                      • String ID: (
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3076950a5e972ab03b8059aab3ed6e47f5d1901406f16b7d02bdc45a842cb842
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e35da207354a059ff5be93f9a82f0134fe8eaf4053ff8ae8e363e70f58ececc8
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3076950a5e972ab03b8059aab3ed6e47f5d1901406f16b7d02bdc45a842cb842
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5261E275D00219EFCF04CFA8D984AAEBBF5FF48310F20852AEA95A7250D774A941DF90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • ___free_lconv_mon.LIBCMT ref: 00F0DAA1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D659
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D66B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D67D
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D68F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6A1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6B3
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6C5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6D7
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6E9
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6FB
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D70D
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D71F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D731
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DA96
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DAB8
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DACD
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DAD8
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DAFA
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DB0D
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DB1B
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DB26
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DB5E
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DB65
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DB82
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0DB9A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 161543041-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 40e298aab359105e97d9de93dfc1f824852cffcb8b8b17c664c5d412436e23b4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 84ce9fade3f582fe4ff27133483d01ec8b776bff6dda228a217218dec167dd46
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 40e298aab359105e97d9de93dfc1f824852cffcb8b8b17c664c5d412436e23b4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1E314A71A042059FEB61AAB9EC49B5AB7E9FF40320F654419E449D71D2DB39EC80FB20
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00F3369C
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F336A7
                                                                                                                                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00F33797
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00F3380C
                                                                                                                                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 00F3385D
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F33882
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00F338A0
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(00000000), ref: 00F338A7
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00F33921
                                                                                                                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00F3395D
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: %s%u
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4010501982-679674701
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 980daacfe5c71e003227bef54d9236806a84a70bef3bf41f2ed545e517a1fee8
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 40251ee399b07277f13f5800ec3b69b7933d4332624e630de39adafe89873495
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 980daacfe5c71e003227bef54d9236806a84a70bef3bf41f2ed545e517a1fee8
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A991C171605606EFD718DF24C885FBAF7A9FF44320F008629FA99D2190DB70EA45DBA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00F34994
                                                                                                                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00F349DA
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F349EB
                                                                                                                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,00000000), ref: 00F349F7
                                                                                                                                                                                                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 00F34A2C
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00F34A64
                                                                                                                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00F34A9D
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00F34AE6
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00F34B20
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F34B8B
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                                                                                                                                      • String ID: ThumbnailClass
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 98d1d1f972952808795c402fb978e4f44dfc6d934234a59b44cb9f733f65d02c
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 3daf244ba3fad6506092bef0a2059ad5512a59b44a2b4f31596d5aff6f300d9a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 98d1d1f972952808795c402fb978e4f44dfc6d934234a59b44cb9f733f65d02c
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E691BE325082099FDB04CF14C981BAAB7E8FF84374F04846AFD859A196DB74FD45EBA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(00FA1990,000000FF,00000000,00000030), ref: 00F3BFAC
                                                                                                                                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(00FA1990,00000004,00000000,00000030), ref: 00F3BFE1
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(000001F4), ref: 00F3BFF3
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(?), ref: 00F3C039
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,00000000), ref: 00F3C056
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,-00000001), ref: 00F3C082
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,?), ref: 00F3C0C9
                                                                                                                                                                                                                                                                                                                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F3C10F
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F3C124
                                                                                                                                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F3C145
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 27f80c61655c3759e1e6975a1de6fe3b0e28fb42636c3f20b2e7651d00c8eeb3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 7b48e475634a651aef54a5b409920e6fbf8d0c14d67205c8e177f02dd8dace01
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 27f80c61655c3759e1e6975a1de6fe3b0e28fb42636c3f20b2e7651d00c8eeb3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 20619DB190028AEFDF15DF64CD88ABEBBB8EB05364F044115E991B3291C775AD04EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F5CC64
                                                                                                                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00F5CC8D
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F5CD48
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00F5CCAA
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00F5CCBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F5CCCF
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F5CD05
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F5CD28
                                                                                                                                                                                                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F5CCF3
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                                                                                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ce10619d0170f7393e3339c8aa27c65d4079f2ca99d77fcb157de7a8fd18a1c4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 7ff30c0524f7fee41c70c12529ebfcea2ff52f9f965101662a4ac6cca0ef6ed0
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ce10619d0170f7393e3339c8aa27c65d4079f2ca99d77fcb157de7a8fd18a1c4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AB318071D0122CBFDB219B90DC88EFFBB7CEF05751F000165EA56E2141D6B49A49BAE0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F43D40
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F43D6D
                                                                                                                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F43D9D
                                                                                                                                                                                                                                                                                                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00F43DBE
                                                                                                                                                                                                                                                                                                                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00F43DCE
                                                                                                                                                                                                                                                                                                                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00F43E55
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F43E60
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F43E6B
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: :$\$\??\%s
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c220bdc7a2f816d982e05bd9b0987d6d386b4771d97414da861fb4e26ff80093
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 64bedcdeeaa3e7a689209b741a1476016f8c1c2057d99e1459c9a655665a97d8
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c220bdc7a2f816d982e05bd9b0987d6d386b4771d97414da861fb4e26ff80093
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2631A17290020DABDB209BA0DC49FEF3BBCEF89710F1041A5FA55E6160E7B497449B64
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • timeGetTime.WINMM ref: 00F3E6B4
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EEE551: timeGetTime.WINMM(?,?,00F3E6D4), ref: 00EEE555
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(0000000A), ref: 00F3E6E1
                                                                                                                                                                                                                                                                                                                                                      • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00F3E705
                                                                                                                                                                                                                                                                                                                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00F3E727
                                                                                                                                                                                                                                                                                                                                                      • SetActiveWindow.USER32 ref: 00F3E746
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00F3E754
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00F3E773
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(000000FA), ref: 00F3E77E
                                                                                                                                                                                                                                                                                                                                                      • IsWindow.USER32 ref: 00F3E78A
                                                                                                                                                                                                                                                                                                                                                      • EndDialog.USER32(00000000), ref: 00F3E79B
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                                                                                                                                      • String ID: BUTTON
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9021e6f6829c1721c9449b33d6bcf78cb23845dbb59ed6d9249de1e19e660ed3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 29e7c7a98f082a8d64e6812c9bfe4cdd3b40b6a14ad525c3450c3cbba36fe39d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9021e6f6829c1721c9449b33d6bcf78cb23845dbb59ed6d9249de1e19e660ed3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A221A1B034020DAFEF005F64EC99A363B69FF56368F000425F4A6826E1DBB1AC00BB64
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F3EA5D
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F3EA73
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F3EA84
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F3EA96
                                                                                                                                                                                                                                                                                                                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F3EAA7
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: SendString$_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 957b38f97de2a32242ea58a0241c490f805adfa67cf19961b04c7cdeeab9d0db
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8380a5f31272e90f9991965c772f7eb14d96977418f9fa658cc76bede16034f3
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 957b38f97de2a32242ea58a0241c490f805adfa67cf19961b04c7cdeeab9d0db
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4C117731A5025979EB20A7A2DC4AEFF6ABCEFD1B50F0004267411E21D1DE709D06D5B1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00F3A012
                                                                                                                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 00F3A07D
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00F3A09D
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A0), ref: 00F3A0B4
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00F3A0E3
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A1), ref: 00F3A0F4
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000011), ref: 00F3A120
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 00F3A12E
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000012), ref: 00F3A157
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000012), ref: 00F3A165
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00F3A18E
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(0000005B), ref: 00F3A19C
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 541375521-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6619137477c1c2bfff4f985a702edc3e9485f6f36904f5cdd6d1c29751893752
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 665e771a5f333d494015e7e81888575002ca2302359705c6d66b1c3619af9f1f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6619137477c1c2bfff4f985a702edc3e9485f6f36904f5cdd6d1c29751893752
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E051DA30E0878829FB35EB7188157EABFF49F123B0F08459DD5C2571C2DA94AA4CDB62
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00F35CE2
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00F35CFB
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00F35D59
                                                                                                                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00F35D69
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00F35D7B
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00F35DCF
                                                                                                                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00F35DDD
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00F35DEF
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00F35E31
                                                                                                                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00F35E44
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F35E5A
                                                                                                                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00F35E67
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3096461208-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 72142b544c2140725a16b494a88fedf975e3216b3521d85aa25deaa650fc07f0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 32675862a2494f680a7a39286180e61d6cb093e187c08e8694eb90f8063ba854
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 72142b544c2140725a16b494a88fedf975e3216b3521d85aa25deaa650fc07f0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1A511FB1F00609AFDF18CF68CD89AAE7BB5EB88711F108129F555E7290D7B09E00DB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00EE8BE8,?,00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00EE8FC5
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00EE8C81
                                                                                                                                                                                                                                                                                                                                                      • KillTimer.USER32(00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00EE8D1B
                                                                                                                                                                                                                                                                                                                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00F26973
                                                                                                                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00F269A1
                                                                                                                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00F269B8
                                                                                                                                                                                                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00EE8BBA,00000000), ref: 00F269D4
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00F269E6
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 641708696-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 03aa2687ac957ad79c8c9fefb52f3fa2f5743cb5522013c97b891e3588cbef10
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9a4a6a9b7d298f313ecc79d838ee20088498f98ed8dd130f252d7369ec15fac2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 03aa2687ac957ad79c8c9fefb52f3fa2f5743cb5522013c97b891e3588cbef10
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B761EF7050265CDFDB219F16DA48B26B7F1FF06326F20651DE086A7560CB75AC80EF91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9944: GetWindowLongW.USER32(?,000000EB), ref: 00EE9952
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 00EE9862
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ColorLongWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 259745315-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f6629c5ebd4551039d42395cd5c40753f9c134cf1beab1f5af2299e1059472a2
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8f4126348b6487308d4fd5ca64cc50d152525a29a29890a6877284c2c3de060b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f6629c5ebd4551039d42395cd5c40753f9c134cf1beab1f5af2299e1059472a2
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FB41E031100698AFDB245F399C84BB93BA5AB06330F185605F9F2972F2D3719C41EB51
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID: .
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-3963672497
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c0f35ad261ebefe19991f69f253a248989528190f00f0667f42ce0553fe57774
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e7cd8e08e24b364f28129ddec44ab507244b2e3301fd1ebfcb9860bdb16038ad
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c0f35ad261ebefe19991f69f253a248989528190f00f0667f42ce0553fe57774
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E4C1E2B5E08249AFDB11DFA8DC41BADBBB0AF49320F044159F554A73D2DB748942FB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00F1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00F39717
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,00F1F7F8,00000001), ref: 00F39720
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00F1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00F39742
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,00F1F7F8,00000001), ref: 00F39745
                                                                                                                                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00F39866
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8f9d82a80d32d79349b2afd92a634e81e78fde75fc1fabc474224383f535c980
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0dae84acc7168d03cbc8a205d919e744213e6318532a44962e5f040dc75801d1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8f9d82a80d32d79349b2afd92a634e81e78fde75fc1fabc474224383f535c980
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0C417272904209AADF04FBE0DE42DEEB3B8EF55740F501026F10172192EB756F49DB61
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                                                                                                                                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00F307A2
                                                                                                                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00F307BE
                                                                                                                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00F307DA
                                                                                                                                                                                                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00F30804
                                                                                                                                                                                                                                                                                                                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00F3082C
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F30837
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F3083C
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 323675364-22481851
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: db4e2928eceb245e703f7d4c7633f987fc860ed84419db75cedbca717d8d4899
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c2ffd57526a2427f240fc5bda567b8e5b281166c0e9af154e3bd397d73669108
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: db4e2928eceb245e703f7d4c7633f987fc860ed84419db75cedbca717d8d4899
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E6412676C0022DABDF15EBA4DC958EDB7B8FF04750F04412AE951B72A1EB709E05DBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00F6403B
                                                                                                                                                                                                                                                                                                                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00F64042
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00F64055
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00F6405D
                                                                                                                                                                                                                                                                                                                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F64068
                                                                                                                                                                                                                                                                                                                                                      • DeleteDC.GDI32(00000000), ref: 00F64072
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00F6407C
                                                                                                                                                                                                                                                                                                                                                      • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00F64092
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00F6409E
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                                                                                                                                                                      • String ID: static
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2559357485-2160076837
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 858e873539f09cc59d5b15c76a20c0fa8289cc52e3a1dfed7a981a1f1fa983b8
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d0d96cc6837cfcbce609b1a9c93ee6d8bb080bafb00072f57ea2214d491b1f31
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 858e873539f09cc59d5b15c76a20c0fa8289cc52e3a1dfed7a981a1f1fa983b8
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3B316132501219BBDF219FA4CC05FEA3B69FF0D360F110215FAA9E61A1C775D851EBA4
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00F53C5C
                                                                                                                                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00F53C8A
                                                                                                                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00F53C94
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F53D2D
                                                                                                                                                                                                                                                                                                                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00F53DB1
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F53ED5
                                                                                                                                                                                                                                                                                                                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00F53F0E
                                                                                                                                                                                                                                                                                                                                                      • CoGetObject.OLE32(?,00000000,00F6FB98,?), ref: 00F53F2D
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000), ref: 00F53F40
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F53FC4
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F53FD8
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 429561992-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1fb61a956d0ca4bcaea9c328a74695a3c83502959aa8d4d91c413f3344a0d84d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 114f58afb4fc0bfeca98d7a2c47e598502c6366b468decd9638541383b463e86
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1fb61a956d0ca4bcaea9c328a74695a3c83502959aa8d4d91c413f3344a0d84d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CAC136716082059FC700DF68C88492BB7F9FF89795F00491DFA899B251DB71EE09DB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00F47AF3
                                                                                                                                                                                                                                                                                                                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00F47B8F
                                                                                                                                                                                                                                                                                                                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00F47BA3
                                                                                                                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(00F6FD08,00000000,00000001,00F96E6C,?), ref: 00F47BEF
                                                                                                                                                                                                                                                                                                                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00F47C74
                                                                                                                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(?,?), ref: 00F47CCC
                                                                                                                                                                                                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00F47D57
                                                                                                                                                                                                                                                                                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00F47D7A
                                                                                                                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00F47D81
                                                                                                                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00F47DD6
                                                                                                                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00F47DDC
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2762341140-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f2e45497b9429ea34ce65531e6a9de658073eca751c4b8527349c30b3f1b5251
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 1b726b75ec19f8071e8f34ff4b796efb967283cfbbef957801d15212787a6683
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f2e45497b9429ea34ce65531e6a9de658073eca751c4b8527349c30b3f1b5251
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BAC14C75A04209AFCB14DFA4C884DAEBBF9FF48314B148499E859EB361D730ED41DB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00F65504
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F65515
                                                                                                                                                                                                                                                                                                                                                      • CharNextW.USER32(00000158), ref: 00F65544
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00F65585
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00F6559B
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F655AC
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$CharNext
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1350042424-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a6da4af2a7f02c0fe65cb79cc7a3f2c3e83b851e4d2ff1b2897f44366c41f919
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 1f458816524028b63d9eff41fd1316efca6882ccb948cbe0c21f132c0eb58650
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a6da4af2a7f02c0fe65cb79cc7a3f2c3e83b851e4d2ff1b2897f44366c41f919
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 69619D71900609ABDF10DF64CC84AFE7BB9EB09B34F144145F965BA291DB758A80EB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00F2FAAF
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00F2FB08
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00F2FB1A
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00F2FB3A
                                                                                                                                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(?,?), ref: 00F2FB8D
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00F2FBA1
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F2FBB6
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00F2FBC3
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F2FBCC
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F2FBDE
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F2FBE9
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2706829360-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 34e4f19fe0f8d8cda6360540d702622b35957d4405d3968b08734399a7f02e35
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b52375f5a68a65eaaf2443bc8c4a3765c1d68344958be0d8bf6fb81f0877678a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 34e4f19fe0f8d8cda6360540d702622b35957d4405d3968b08734399a7f02e35
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 29413E35A1021A9FCB00DF64DC589AEBBB9EF48354F008079E996A7261CB74A945DFA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00F39CA1
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00F39D22
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A0), ref: 00F39D3D
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00F39D57
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(000000A1), ref: 00F39D6C
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000011), ref: 00F39D84
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 00F39D96
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000012), ref: 00F39DAE
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(00000012), ref: 00F39DC0
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00F39DD8
                                                                                                                                                                                                                                                                                                                                                      • GetKeyState.USER32(0000005B), ref: 00F39DEA
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 541375521-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 07cbe357ee7449d703831dacd0069eb3be3a7df602b3fa8c067ecb1f43b2b252
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 69d80b6ac807401ee90faf534a599216bfa5816165a5e9f170294913594acf86
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 07cbe357ee7449d703831dacd0069eb3be3a7df602b3fa8c067ecb1f43b2b252
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4C41A734D0C7CA69FF31976488053B6BEA06F11374F08805ADAC6566C2DBE59DC4EBA2
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • WSAStartup.WSOCK32(00000101,?), ref: 00F505BC
                                                                                                                                                                                                                                                                                                                                                      • inet_addr.WSOCK32(?), ref: 00F5061C
                                                                                                                                                                                                                                                                                                                                                      • gethostbyname.WSOCK32(?), ref: 00F50628
                                                                                                                                                                                                                                                                                                                                                      • IcmpCreateFile.IPHLPAPI ref: 00F50636
                                                                                                                                                                                                                                                                                                                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F506C6
                                                                                                                                                                                                                                                                                                                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F506E5
                                                                                                                                                                                                                                                                                                                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 00F507B9
                                                                                                                                                                                                                                                                                                                                                      • WSACleanup.WSOCK32 ref: 00F507BF
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                                                                                                                                      • String ID: Ping
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: cb646d986074740f7a40c9529f754f49d2dd1d87326d88e35f3b779985266b61
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8eed404ce0d2b5e816890d54f5a461674dac9e74197f431279a776afd81b7dcb
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cb646d986074740f7a40c9529f754f49d2dd1d87326d88e35f3b779985266b61
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0291A075A042019FD320CF15D488F16BBE0EF48328F1485A9F9A99B7A2DB70ED49DF81
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                                                                                                                                      • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 707087890-567219261
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7764294d0ceea4ce298c21b0c3e8b4a7b03e72c0f8e48e1b1b9fa2415966d1b6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ff8bb82d76873f97cd513c28ad80fcbbd340f32ff4da5045f8a848d430cfa982
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7764294d0ceea4ce298c21b0c3e8b4a7b03e72c0f8e48e1b1b9fa2415966d1b6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5B51C332A001169BCF14DFA8C8415BEB7F1AF643A1B204229EA66F72C1DB31DD46E790
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CoInitialize.OLE32 ref: 00F53774
                                                                                                                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00F5377F
                                                                                                                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00F6FB78,?), ref: 00F537D9
                                                                                                                                                                                                                                                                                                                                                      • IIDFromString.OLE32(?,?), ref: 00F5384C
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00F538E4
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F53936
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                                                                                                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9517fce51cebcf2e4e419feadf55fd025ae8dc478ed44188215443ea5127d2b0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ed8e89decbf0f02d20df056352c36777665ed3cb86787042be9d6bee3b767862
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9517fce51cebcf2e4e419feadf55fd025ae8dc478ed44188215443ea5127d2b0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7861B371608301AFD311DF68D849F6ABBE4EF48756F100909FA859B291D770EE48EB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00F433CF
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00F433F0
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 10e5ea18ab768b20a1370df41ec4dabbea64f59cfdc96eae8f2216611271ddcf
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ff0e1183209b57a226a3a1d14daf2155a668b27974ee9987c88f0e9a37d06fcb
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 10e5ea18ab768b20a1370df41ec4dabbea64f59cfdc96eae8f2216611271ddcf
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8251B172D00209AADF14EBE0DD42EEEB7B8EF14340F144066F405721A2EB756F59EB61
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1256254125-769500911
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 316f193f17759bd7afb1ab74a47e6841fe7abc5a59a586b77ddec909d1e21271
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 840894c791ce88323bcd29b35966bd204f878e0b37e5084d3a66215db7b6a6e2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 316f193f17759bd7afb1ab74a47e6841fe7abc5a59a586b77ddec909d1e21271
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E841E832E0002B9BCB105F7DC8A15BE77A5EFA0774F244169E625DB286E731CD81E790
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00F453A0
                                                                                                                                                                                                                                                                                                                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00F45416
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F45420
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 00F454A7
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                                                                                                                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4194297153-14809454
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b18aa1f29d74896505efd5723522d88b92c023c6c4bbf9ad30068e992edd49dc
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b719162c5d40e89d333d7ce1d586cd3c4e7e8d0b9d17692870b521e2dd48ffa1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b18aa1f29d74896505efd5723522d88b92c023c6c4bbf9ad30068e992edd49dc
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4231C035A001089FDB10EF68C894BAABBB4EF05715F148066E805DF3A3DB75DD82EB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateMenu.USER32 ref: 00F63C79
                                                                                                                                                                                                                                                                                                                                                      • SetMenu.USER32(?,00000000), ref: 00F63C88
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F63D10
                                                                                                                                                                                                                                                                                                                                                      • IsMenu.USER32(?), ref: 00F63D24
                                                                                                                                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 00F63D2E
                                                                                                                                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F63D5B
                                                                                                                                                                                                                                                                                                                                                      • DrawMenuBar.USER32 ref: 00F63D63
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0$F
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3e473dcd530080b8e5ff351fc761225ebbd5db22d55c1e87fb0e4c96223a0bc5
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d06974b1c669787d720c46374e6a086fba88734b90c71e2ac9fa38bb578b4dd0
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3e473dcd530080b8e5ff351fc761225ebbd5db22d55c1e87fb0e4c96223a0bc5
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7F415979A01209AFDB14CF64DC44AAA7BB5FF49350F180029FA96A7360D770AE10EF94
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00F31F64
                                                                                                                                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32 ref: 00F31F6F
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32 ref: 00F31F8B
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F31F8E
                                                                                                                                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 00F31F97
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00F31FAB
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F31FAE
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 10c1a19115df4b5ef701bab0ea087f564cd480f0b032e4808eabba1a4e96db2c
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d48722d6d471d44ef1a6b7993467efc19aaa9ed1cfe1f0ec409d6a31dfeefab9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 10c1a19115df4b5ef701bab0ea087f564cd480f0b032e4808eabba1a4e96db2c
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6521F574D00118BBCF04AFA0DC44DFEBBB4EF05360F105106F9A567292CB794905EB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00F32043
                                                                                                                                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32 ref: 00F3204E
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32 ref: 00F3206A
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F3206D
                                                                                                                                                                                                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 00F32076
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00F3208A
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F3208D
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9ed6d1eb9c10bbde09879cd09b3dfe8b8e8b0162fe1ea44d546caa0b355d3551
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f9357cd3a26dc938682192c3d1acbcc099f2b719e109d27f06e99fe07164dbe6
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9ed6d1eb9c10bbde09879cd09b3dfe8b8e8b0162fe1ea44d546caa0b355d3551
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D921F9B5D00218BBDF15AFA0DC45EFEBBB8EF05350F104006F9A5672A2C6794919EB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00F63A9D
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00F63AA0
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F63AC7
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F63AEA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00F63B62
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00F63BAC
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00F63BC7
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00F63BE2
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00F63BF6
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00F63C13
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 312131281-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c72b2397505c7338cc3405c0b2ade8195c83f6a8f90389b2cecfd0921ae6f05e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 36155585d4b4421f99113823e4892386c1267ab812adda6c757d09381599b214
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c72b2397505c7338cc3405c0b2ade8195c83f6a8f90389b2cecfd0921ae6f05e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FA617975A00208AFDB10DFA8CC81EEE77F8EF49714F10419AFA15A72A1D774AE45EB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00F3B151
                                                                                                                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B165
                                                                                                                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00F3B16C
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B17B
                                                                                                                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F3B18D
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B1A6
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B1B8
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B1FD
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B212
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B21D
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2156557900-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f658789497bb81e90e4a2f3239d9da554954db0e18c75453b02ad2be838128a0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a73a8c1ee7dfaa2a5f946ed6b3039a443103c72c2889627c353ae4e9c4a4c0ce
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f658789497bb81e90e4a2f3239d9da554954db0e18c75453b02ad2be838128a0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0131DDB1900208BFDB11AF24DC69B7EBBA9BB52335F108104FB56D6190D7B4DE00AFA4
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02C94
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CA0
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CAB
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CB6
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CC1
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CCC
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CD7
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CE2
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CED
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02CFB
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7b963a7174df728a00530f8254313c95f570bffdba351a67ef9a23d2a7edbeef
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a9c2183d17f87dc0f74180855e0818dddac56a124564722a973171ce63d7a928
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7b963a7174df728a00530f8254313c95f570bffdba351a67ef9a23d2a7edbeef
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9F119676500108AFCB42EF58DC46CDD3BB9FF05350F9144A5F9485B262D635EA50BBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F47FAD
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00F47FC1
                                                                                                                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00F47FEB
                                                                                                                                                                                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00F48005
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48017
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48060
                                                                                                                                                                                                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F480B0
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 769691225-438819550
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c4e5f3234ee3eb72ed5c723074c026eb87d9e6b54f99eed595261e00f8e80d10
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d653f0cc30186eebefe1bff6a67abca3121028b7e956f62d5424322bd12644dc
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c4e5f3234ee3eb72ed5c723074c026eb87d9e6b54f99eed595261e00f8e80d10
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1481A0729083459BCB20EF14C844AAEBBE8FF84360F14495AFC85D7250EB75DD49AB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00ED5C7A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED5D0A: GetClientRect.USER32(?,?), ref: 00ED5D30
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED5D0A: GetWindowRect.USER32(?,?), ref: 00ED5D71
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED5D0A: ScreenToClient.USER32(?,?), ref: 00ED5D99
                                                                                                                                                                                                                                                                                                                                                      • GetDC.USER32 ref: 00F146F5
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F14708
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00F14716
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00F1472B
                                                                                                                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00F14733
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F147C4
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                                                                                                                                      • String ID: U
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7c16cb0ba8f229dd787b6a8cd854fae3d5f14969d01fe55ee8df92253a0f4882
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f2bddefa2391e27d76852036c8e92ab1b3fb97d38c6d7b3225c3ed751c860ddc
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7c16cb0ba8f229dd787b6a8cd854fae3d5f14969d01fe55ee8df92253a0f4882
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0571A731900209DFCF218F64C984AFA7BB5FF86365F14426AED556A2A5C731AC81EF50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00F435E4
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00FA2390,?,00000FFF,?), ref: 00F4360A
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 18d003102f83da9b0e3d58bcd915cceefe93d844f9bde4a423e8b1a95d366d28
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 70193211ba5f8471677e8855713c476373ecb68524cdb4964056c5b58d4a79e8
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 18d003102f83da9b0e3d58bcd915cceefe93d844f9bde4a423e8b1a95d366d28
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5F519271D00209BADF14EBA0DC42EEDBB78EF04310F145126F515722A2DB755B99EFA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F4C272
                                                                                                                                                                                                                                                                                                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F4C29A
                                                                                                                                                                                                                                                                                                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F4C2CA
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F4C322
                                                                                                                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 00F4C336
                                                                                                                                                                                                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00F4C341
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ce1297f74c37a5bce44d03322e4826634dbbbcd63fa746b5c2d5a4e2a1356c08
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 1ee118e3daea5115b564534c6dbaf7aea575b994cfc1a5e1b053f232fba7273a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ce1297f74c37a5bce44d03322e4826634dbbbcd63fa746b5c2d5a4e2a1356c08
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D7317FB1601208AFD7619FA48C88ABB7FFCEB49754B14951EF886D3210DB74DD44ABE0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F13AAF,?,?,Bad directive syntax error,00F6CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00F398BC
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000,?,00F13AAF,?), ref: 00F398C3
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F39987
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: fb6970b90db702ba17136d1626e7220a32244df3d784d2f447bb252bd6ffbd50
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 4cad1357ceefce770b78f58e0bf15b5f1af785d7ca21441658a88b97e841a01e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fb6970b90db702ba17136d1626e7220a32244df3d784d2f447bb252bd6ffbd50
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9A219E3290420EABDF15AF90CC06EEE77B5FF18700F04542AF515761A2EBB19A28EB51
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32 ref: 00F320AB
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00F320C0
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F3214D
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                                                                                                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3fd4b87fb01e25fe9a9976fa3b2f7f666479c645f35d1772b30521c0f47204fd
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f9084cdd21516d52816ed44393c8935364dc5292fbed9965d7b27516ed40c2ad
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3fd4b87fb01e25fe9a9976fa3b2f7f666479c645f35d1772b30521c0f47204fd
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 531106B7A8870AB9FA023620DC06DB7379CCB04734F201156FB04B50E2FAA2A9027658
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1282221369-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4d5652b9d8146ff4d1edfc92fbd24be33afb78ab6e388a1427a7996d77a728ca
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 789c730c585f21d165426fb02adcd4d6fc3b54b69629c04c4a48f8fc26ef18ac
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4d5652b9d8146ff4d1edfc92fbd24be33afb78ab6e388a1427a7996d77a728ca
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2E6159B2D04306AFDB21AFB49C85A6D7BA5AF01320F14426DF945A72C1DB35AD01B7F1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00F65186
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 00F651C7
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000005,?,00000000), ref: 00F651CD
                                                                                                                                                                                                                                                                                                                                                      • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00F651D1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F66FBA: DeleteObject.GDI32(00000000), ref: 00F66FE6
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F6520D
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F6521A
                                                                                                                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00F6524D
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00F65287
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00F65296
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3210457359-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 30a827e35695d48d8184f5fe1932ca59a01ed03738c7cd0300c60c0f293b0f40
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 01347613d49fe4c125af881d52b4f1b8e40c0b51364d2957ae928c2caca54828
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 30a827e35695d48d8184f5fe1932ca59a01ed03738c7cd0300c60c0f293b0f40
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4051E470E40A08BFEF209F64CC55BD93BA5FB06B24F144012F665B62E1C3B5A990FB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00F26890
                                                                                                                                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00F268A9
                                                                                                                                                                                                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F268B9
                                                                                                                                                                                                                                                                                                                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00F268D1
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F268F2
                                                                                                                                                                                                                                                                                                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00EE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00F26901
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F2691E
                                                                                                                                                                                                                                                                                                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00EE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00F2692D
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1268354404-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d755087c04e42a7231a99707793710ad443c40c84fd727965cd9c824d18b03f7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a2863b1fc9711eeb61a359c7c6840148b16fe212b4335730e2e4763b0f260642
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d755087c04e42a7231a99707793710ad443c40c84fd727965cd9c824d18b03f7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5E517CB4A00209AFDB20CF25DC55BAA77B5FF48760F104518F956E72A0DBB1E990EB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F4C182
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F4C195
                                                                                                                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 00F4C1A9
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F4C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F4C272
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F4C253: GetLastError.KERNEL32 ref: 00F4C322
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F4C253: SetEvent.KERNEL32(?), ref: 00F4C336
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F4C253: InternetCloseHandle.WININET(00000000), ref: 00F4C341
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 337547030-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b4cb20eaf60ecbeccc917942f49608e5e27b138d348d76bc2e49ff71e9fa0722
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ebebb2b7ab036f532a0fef947c15a2fa787f1bb6d395e496093bb9d57c5f619f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b4cb20eaf60ecbeccc917942f49608e5e27b138d348d76bc2e49ff71e9fa0722
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DB31BC71602605AFDB608FA4DC04A76BFE8FF58310B00552DFD9A82220D7B1E910BBE0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F33A57
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: GetCurrentThreadId.KERNEL32 ref: 00F33A5E
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F325B3), ref: 00F33A65
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F325BD
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F325DB
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00F325DF
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F325E9
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F32601
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00F32605
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F3260F
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F32623
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00F32627
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2014098862-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 037c73374984fec4e04f19fb3aa33dc3a3a0363b0bc74792fd3bd6759a4864fa
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: cef5c273ac0052ee6b0f75754c539b404273a0fcfab272e3287ee04709c442b5
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 037c73374984fec4e04f19fb3aa33dc3a3a0363b0bc74792fd3bd6759a4864fa
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B401D831390214BBFB107769DC8AF693F59DF4EB21F100001F3A8AE0D2C9F22444AAA9
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00F31449,?,?,00000000), ref: 00F3180C
                                                                                                                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00F31449,?,?,00000000), ref: 00F31813
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F31449,?,?,00000000), ref: 00F31828
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00F31449,?,?,00000000), ref: 00F31830
                                                                                                                                                                                                                                                                                                                                                      • DuplicateHandle.KERNEL32(00000000,?,00F31449,?,?,00000000), ref: 00F31833
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F31449,?,?,00000000), ref: 00F31843
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00F31449,00000000,?,00F31449,?,?,00000000), ref: 00F3184B
                                                                                                                                                                                                                                                                                                                                                      • DuplicateHandle.KERNEL32(00000000,?,00F31449,?,?,00000000), ref: 00F3184E
                                                                                                                                                                                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,00F31874,00000000,00000000,00000000), ref: 00F31868
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1957940570-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d467ad13d4c28004b883ea5acc35e1b5ee26efb3b0dc3203447a29b48389c5f0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a4db7853dba07473c3229e3c3f78c4782d246211a6fa0819ac142338ce9e052d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d467ad13d4c28004b883ea5acc35e1b5ee26efb3b0dc3203447a29b48389c5f0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D901BF75240348BFE710AB65DC4DF6B3B6CEB8AB11F004411FA95DB192C6B19800EB70
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                                                                                                                                      • String ID: }}$}}$}}
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1036877536-1495402609
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a73a06a7f52ce982819102faf9bd60b83de2f2853abc14e1e7b925082fa031d9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AFA149B2E043869FDB16CF18CC917AEBBE5EF61360F14416DE6959B2C1C238A981F750
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00F3D501
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00F3D50F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3D4DC: CloseHandle.KERNELBASE(00000000), ref: 00F3D5DC
                                                                                                                                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F5A16D
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F5A180
                                                                                                                                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F5A1B3
                                                                                                                                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F5A268
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(00000000), ref: 00F5A273
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F5A2C4
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                                                                                                                                      • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f91fc2432f87e65f2b2b7795d9600e74204b9543aff0cd1aade9a3573044ec6e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ac5220f566202db8ddb8f510870cddf676ea554ac356395dee0a899990388225
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f91fc2432f87e65f2b2b7795d9600e74204b9543aff0cd1aade9a3573044ec6e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4561C3316046429FD710DF18C495F25BBE1EF44328F18858CE9A68B7A3C776EC4ADB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00F63925
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00F6393A
                                                                                                                                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00F63954
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F63999
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00F639C6
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00F639F4
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: SysListView32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: aa7e9c9bfa7c30c5e2c991c209f558a37aa64925f49d44525a26b6af5d6b4c5d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 08d84e7964e5ef6d42dbb1733a54680e179404dfcfb8d846ff7c363560e59749
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aa7e9c9bfa7c30c5e2c991c209f558a37aa64925f49d44525a26b6af5d6b4c5d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A418271E00319ABEF219F64CC45FEA77A9EF08364F100526F958E7281D7B59980EB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F3BCFD
                                                                                                                                                                                                                                                                                                                                                      • IsMenu.USER32(00000000), ref: 00F3BD1D
                                                                                                                                                                                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 00F3BD53
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(00FF5600), ref: 00F3BDA4
                                                                                                                                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(00FF5600,?,00000001,00000030), ref: 00F3BDCC
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0$2
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 21a6c625072e771e982a2af6944aee7ba148ab03ad7b41e8de4e8512eafca6d7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 99e2abb871c77921446f4538435622174179bf9ccdf35a9417d5a8b46b0e4a41
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 21a6c625072e771e982a2af6944aee7ba148ab03ad7b41e8de4e8512eafca6d7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7A51BF70A002099BDF20DFA8DCA8BAEBBF4BF45334F144219E651E7291D7709941EB61
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00EF2D4B
                                                                                                                                                                                                                                                                                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00EF2D53
                                                                                                                                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00EF2DE1
                                                                                                                                                                                                                                                                                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00EF2E0C
                                                                                                                                                                                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00EF2E61
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                                                                                                                                      • String ID: &H$csm
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1170836740-1242228090
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3067d1d9329089a2f252cfd824a94c0a2d729d901cad5685071f553f0150ba0d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8fb9091a01122898b411935e6baf77774a362a754c7a69f0aae1f6facda06bcf
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3067d1d9329089a2f252cfd824a94c0a2d729d901cad5685071f553f0150ba0d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9641A234A0020DABCF14DF68C845AAEBBB5BF45328F149159EB14BB392D7369A01CBD1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadIconW.USER32(00000000,00007F03), ref: 00F3C913
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: IconLoad
                                                                                                                                                                                                                                                                                                                                                      • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d9a6744e6f289cb10272ddcc90e2c93c525454ba6c346ad4196e2505bb1e8beb
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 3995f7f72e4493518f754db1ed509c3e81561eca55e98dcea242d24904d1180d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d9a6744e6f289cb10272ddcc90e2c93c525454ba6c346ad4196e2505bb1e8beb
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B211DB32A8A70ABAA70597549C82EAB7BDCDF15774F11006AF500B51C1EBA0AE0073E5
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0.0.0.0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8fc47cb004c0841568b37e6300b0a67f5119660bdd6969aef98a871c16b75149
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9c6c8e799f5fc7ba66a73a3a6ca68decb1168fe38d0cd3ea621891b3db0a893e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8fc47cb004c0841568b37e6300b0a67f5119660bdd6969aef98a871c16b75149
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AA11E771904119ABCB206B20AC0AEFF7BBCDF50730F050169F595A7091EFB59A81AAA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(0000000F), ref: 00F69FC7
                                                                                                                                                                                                                                                                                                                                                      • GetSystemMetrics.USER32(0000000F), ref: 00F69FE7
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00F6A224
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00F6A242
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00F6A263
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000003,00000000), ref: 00F6A282
                                                                                                                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00F6A2A7
                                                                                                                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00F6A2CA
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1211466189-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f71ac3ff6b1c4bd1efc8c70dfc03b692fbe60b24d132e39d22737f9c0d3f2f58
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: fbd4b8e506c58c9202c1fa1da782e1d71376f26c197ff7a21b1a80787366647f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f71ac3ff6b1c4bd1efc8c70dfc03b692fbe60b24d132e39d22737f9c0d3f2f58
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 67B1DC31A00219DFDF14CF68C9947AE3BB2FF45711F098069EC89AB295D771A940EF51
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 952045576-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3ef39e936a444fa6c5927442814559e7ad97804ccbef7cda5713c8cb3eb7b082
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 086149c3800c635f1077d55c183cfd7827e553f9208ed340457e4308ac038a62
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3ef39e936a444fa6c5927442814559e7ad97804ccbef7cda5713c8cb3eb7b082
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5A41BF65D1021CA6DB11EBB48C8A9DFB7ECAF45710F409466E618F3161EB34E245C3E5
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00F2682C,00000004,00000000,00000000), ref: 00EEF953
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00F2682C,00000004,00000000,00000000), ref: 00F2F3D1
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00F2682C,00000004,00000000,00000000), ref: 00F2F454
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ShowWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1268545403-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 2fb31a280774299fe25f3206f2f4a46d2421140fb86f0d38a6666b769bfcaba6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: edced41ceae0b0892012b447ed8511c09eb0f5b67adc13207d7d988b1b346e3e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2fb31a280774299fe25f3206f2f4a46d2421140fb86f0d38a6666b769bfcaba6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D9416C315042C8BAC734DB6AE88877A7BA1AFC6314F15603DE0C777562C677D880EB11
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00F62D1B
                                                                                                                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00F62D23
                                                                                                                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F62D2E
                                                                                                                                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00F62D3A
                                                                                                                                                                                                                                                                                                                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00F62D76
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F62D87
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00F65A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00F62DC2
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00F62DE1
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3864802216-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: beab8fef33398390b95a9c0d0464a4f7a6d39c55b75974318dc044b272082834
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c86ade9eb362ba464f3947d0980e61655e2569a3f46fb9ae2eb1162e5ba5c5d8
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: beab8fef33398390b95a9c0d0464a4f7a6d39c55b75974318dc044b272082834
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 73316B72201614BBEB118F54CC8AFFB3BA9EF09725F044055FE889A291C6B59C51DBA4
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _memcmp
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2931989736-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5cb7465f232adbfe6760ec6fc8f4d2e127a8732396e495fe1800ce9792658107
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f947f90b9d14e90102716d29a1003f3c5de6fcdd751f909f1dec4e541baed20b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5cb7465f232adbfe6760ec6fc8f4d2e127a8732396e495fe1800ce9792658107
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E821C9B2B45A0DB7D61455209D83FFA339DAFA0BB4F850020FE05AA581F720EE14E5E6
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-572801152
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b8a607047a28dc12636d9f667c1d22cd209850088bd4d2207b18660a549efc24
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 40167db24aba9bd369f19fada26c4e7b6c528a7118293bebe9d974e5e60f0f73
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b8a607047a28dc12636d9f667c1d22cd209850088bd4d2207b18660a549efc24
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3D1E171E0060A9FDF10CFA8C890BAEB7B5BF48754F148069EE15AB281E770DD49DB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCPInfo.KERNEL32(?,?), ref: 00F115CE
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00F11651
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F116E4
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00F116FB
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F03820: RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F11777
                                                                                                                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F117A2
                                                                                                                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F117AE
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2829977744-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3f997a9267800fb0bcb798ea4aba52bf1388ff6c92127289bec70bf1fc1b396e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 3177b6289a96735ff6e5743dd924eb081798f97d81e7fad9f4a92dd186426fcc
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3f997a9267800fb0bcb798ea4aba52bf1388ff6c92127289bec70bf1fc1b396e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9D91B672E002169EDF208E74DC41AEE7BB6BF49720F184659EA05E7281D735DDC4EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                                                                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 406e4e37994e05abbde8c64c057e2565f534046f40f485de87f9f3f8cffc444e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 80cf2f6875409a2264081aa92d19d5f4a3f92b9a14faa4448ce2df135253ed97
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 406e4e37994e05abbde8c64c057e2565f534046f40f485de87f9f3f8cffc444e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7791C631E00219ABDF20CF55DC44FAEBBB8EF45715F108119FA05AB180D770A989DFA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00F4125C
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00F41284
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00F412A8
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F412D8
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F4135F
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F413C4
                                                                                                                                                                                                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F41430
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2550207440-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ea22393d70089fd8011a68655efeb018773a11f9fe5f91ecb919208b8e677d65
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 823740629c21ea2b1c0afa58886d6b6e23196dfd99b045ed8d092ab26d4c227e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ea22393d70089fd8011a68655efeb018773a11f9fe5f91ecb919208b8e677d65
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B391F476E002189FDB00DF94C884BBE7BB5FF45324F144129ED50E72A1D7B8A981EB90
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3225163088-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 2b413d2180c286ad1dade5da4e36723ee652f59377518b6d909e156b87e5a237
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 42d07238f68e130b0f7c84d587a55dfefa7a2cf515571472c2f88560e53b883a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2b413d2180c286ad1dade5da4e36723ee652f59377518b6d909e156b87e5a237
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FF912671D00219EFCB10CFAACC84AEEBBB8FF49320F149559E515B7292D774A941DBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00F5396B
                                                                                                                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 00F53A7A
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F53A8A
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F53C1F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F40CDF: VariantInit.OLEAUT32(00000000), ref: 00F40D1F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F40CDF: VariantCopy.OLEAUT32(?,?), ref: 00F40D28
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F40CDF: VariantClear.OLEAUT32(?), ref: 00F40D34
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 52654616135c1eda8c4a93731026223b5d94da86fa671f5ef2a652ca9e9e4201
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 2ce3e4f2856ab8f690f10c849aa56ed1a96dcaddb1cd6a4e53b863793946b5b5
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 52654616135c1eda8c4a93731026223b5d94da86fa671f5ef2a652ca9e9e4201
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BD91BE75A083059FC704DF28C48092AB7E5FF88355F04892EF9899B351DB35EE4ADB82
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?,?,00F3035E), ref: 00F3002B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30046
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30054
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?), ref: 00F30064
                                                                                                                                                                                                                                                                                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00F54C51
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F54D59
                                                                                                                                                                                                                                                                                                                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00F54DCF
                                                                                                                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(?), ref: 00F54DDA
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                                                                                                                                      • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e0251c608c5f2ab7df27b6f99daffeea8146f68ac626fa155a92ce1453cf3615
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a8870baab69411dcf37586a3cf9a831c6051735a157a54a23ad54e896fa17d67
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e0251c608c5f2ab7df27b6f99daffeea8146f68ac626fa155a92ce1453cf3615
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B913671D0021D9BDF14DFA4D891AEEB7B8FF48314F10416AE915B7281DB34AA499FA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetMenu.USER32(?), ref: 00F62183
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemCount.USER32(00000000), ref: 00F621B5
                                                                                                                                                                                                                                                                                                                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00F621DD
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F62213
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemID.USER32(?,?), ref: 00F6224D
                                                                                                                                                                                                                                                                                                                                                      • GetSubMenu.USER32(?,?), ref: 00F6225B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F33A57
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: GetCurrentThreadId.KERNEL32 ref: 00F33A5E
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F325B3), ref: 00F33A65
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F622E3
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3E97B: Sleep.KERNEL32 ref: 00F3E9F3
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4196846111-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 01af7916dbcdc06a411ec0bc792e26814f3cfef817805a12e46fc4c3428c67df
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c6d86f7a83abb75a4b2dd218f61c04d54cb48d00aaffad92daf2f5665a9a06b2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 01af7916dbcdc06a411ec0bc792e26814f3cfef817805a12e46fc4c3428c67df
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5B719E76E00605AFCB50DF64C881AAEB7F1EF89320F148459E856FB351DB74EE419B90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • IsWindow.USER32(00FF55D8), ref: 00F67F37
                                                                                                                                                                                                                                                                                                                                                      • IsWindowEnabled.USER32(00FF55D8), ref: 00F67F43
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00F6801E
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00FF55D8,000000B0,?,?), ref: 00F68051
                                                                                                                                                                                                                                                                                                                                                      • IsDlgButtonChecked.USER32(?,?), ref: 00F68089
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(00FF55D8,000000EC), ref: 00F680AB
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00F680C3
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4072528602-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 944772c7ff47551ddecbf8477b74b9381b8fc5c6ac38a853823ea2c6648bff7d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 654fdad630e66367bf704670db770a6b1e9a45d99201ecbf60a4757d07e8ba75
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 944772c7ff47551ddecbf8477b74b9381b8fc5c6ac38a853823ea2c6648bff7d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9871CF34A08344AFEB20AF64CC84FBA7BB5FF0A364F140459F99593261CB71AC45EB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32(?), ref: 00F3AEF9
                                                                                                                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00F3AF0E
                                                                                                                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 00F3AF6F
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F3AF9D
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F3AFBC
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F3AFFD
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F3B020
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 87235514-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ec28a4f330a7c2e79d29c4748640083345510e042973a202d407b1bdf6f8b73c
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: cf8908a3756a3ae36f992ce0c1e8cd1a274aa62675de5388fbc7f130d55f97fe
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ec28a4f330a7c2e79d29c4748640083345510e042973a202d407b1bdf6f8b73c
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6051D1A0A047D53DFB364235CC55BBBBEA95B06324F088589E2E9598C2C3D9ECC8E751
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetParent.USER32(00000000), ref: 00F3AD19
                                                                                                                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 00F3AD2E
                                                                                                                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 00F3AD8F
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F3ADBB
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F3ADD8
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F3AE17
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F3AE38
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 87235514-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: aa7c8d9886e728dd63038d90f9545d8c10843d34644216b3b0c78ce0c73ab79e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6a05d8a753f34078de1c68a21b7f3c240e48d43873b6929e25d43325b5c74ca7
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aa7c8d9886e728dd63038d90f9545d8c10843d34644216b3b0c78ce0c73ab79e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5851D5A1A047D53DFB378336CC55B7A7EA85B46320F088588E1D94A8C2D394ECD8F762
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetConsoleCP.KERNEL32(00F13CD6,?,?,?,?,?,?,?,?,00F05BA3,?,?,00F13CD6,?,?), ref: 00F05470
                                                                                                                                                                                                                                                                                                                                                      • __fassign.LIBCMT ref: 00F054EB
                                                                                                                                                                                                                                                                                                                                                      • __fassign.LIBCMT ref: 00F05506
                                                                                                                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00F13CD6,00000005,00000000,00000000), ref: 00F0552C
                                                                                                                                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,00F13CD6,00000000,00F05BA3,00000000,?,?,?,?,?,?,?,?,?,00F05BA3,?), ref: 00F0554B
                                                                                                                                                                                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,00000001,00F05BA3,00000000,?,?,?,?,?,?,?,?,?,00F05BA3,?), ref: 00F05584
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1324828854-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ef7959e9c85ebb7e0dfa019300e5326decb2327b90d51fffdf8c075dfbe491d9
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 04175f3389c240c4d3eb6b7efce666e23f7ec0907fabbf15c28e6b50c68a733a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ef7959e9c85ebb7e0dfa019300e5326decb2327b90d51fffdf8c075dfbe491d9
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DD51C0B1A006099FDB10CFA8DC45AEEBBF9EF09710F18411AE955E7291D7709A41EF60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F5307A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5304E: _wcslen.LIBCMT ref: 00F5309B
                                                                                                                                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00F51112
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F51121
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F511C9
                                                                                                                                                                                                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 00F511F9
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2675159561-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e747bda0b65bbccd5f1843480a1ef8267e12973cca9502961128cf90be79001d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b7de8aaa380d35272b9f3895deaeade55682c3a0c5e52ba448677871037848e2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e747bda0b65bbccd5f1843480a1ef8267e12973cca9502961128cf90be79001d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C7412731600A08AFDB109F24C884BA9BBE9FF45365F148099FE559B291C774FD45DBE0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F3CF22,?), ref: 00F3DDFD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F3CF22,?), ref: 00F3DE16
                                                                                                                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00F3CF45
                                                                                                                                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 00F3CF7F
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F3D005
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F3D01B
                                                                                                                                                                                                                                                                                                                                                      • SHFileOperationW.SHELL32(?), ref: 00F3D061
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f3d5c665f4403a684b025411d26f128502cd2a638692bdc335317caef08000cb
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 27511c0770a151218cd15fd83323431c700791ab8c3eaa3112ab92722baf1496
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f3d5c665f4403a684b025411d26f128502cd2a638692bdc335317caef08000cb
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7D414475D0521C9EDF12EBA4DD81AEEB7B8AF08390F1000E6E545FB142EA34A649DF50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00F62E1C
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F62E4F
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F62E84
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00F62EB6
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00F62EE0
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F62EF1
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F62F0B
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2178440468-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 450811b07a2ad3708ee9ea6c8ec86a9ed346db20ad73692ff8edeb99c0534bc1
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e8ff89989f4d842d92ba31293cf8bd09fd40c79885add8110c3c8835bae23da2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 450811b07a2ad3708ee9ea6c8ec86a9ed346db20ad73692ff8edeb99c0534bc1
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B6311531A445489FEB60CF58DC84F6537E0FB6A720F150165F9948B2B2CBB2A840FB41
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F37769
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F3778F
                                                                                                                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00F37792
                                                                                                                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00F377B0
                                                                                                                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 00F377B9
                                                                                                                                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00F377DE
                                                                                                                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00F377EC
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3761583154-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8b8a859b1a63203a26fd2a472458678adb859cb69e4ff15c51265d0f3a6cfe1e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 7112c88325ec57a9581cf63c0e2e8ce99a4986f26122f1cb75f9692d1b7bb9ec
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8b8a859b1a63203a26fd2a472458678adb859cb69e4ff15c51265d0f3a6cfe1e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A4218376608219AFDB20EFA9CC84DBB77ACEB09774B048025F955DB150D670DC41E7A0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F37842
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F37868
                                                                                                                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00F3786B
                                                                                                                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32 ref: 00F3788C
                                                                                                                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32 ref: 00F37895
                                                                                                                                                                                                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00F378AF
                                                                                                                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00F378BD
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3761583154-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 335b38ac4b4c3d82f721ab6b845f011e3a741e3ad0371023b5e9832312a7f6b7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c7cabeda1fb1161eb5d01e767dd3d364ad23f33858c7f5e8ab61b89f71ced98a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 335b38ac4b4c3d82f721ab6b845f011e3a741e3ad0371023b5e9832312a7f6b7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5221A771604209AFDB20EFB9DC88DBA77ECEB09370B108125F955DB1A1DA70DC41EB64
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00F404F2
                                                                                                                                                                                                                                                                                                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F4052E
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                                                                                                                      • String ID: nul
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 48ca51910e7a2e820baa087bc76660ec034145b5abf7d1068419ac2316626ad9
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e084b37d91ae2dcafc6f07258085f293ea0578b9cf29cbe1710d1a9f44ccf4d2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 48ca51910e7a2e820baa087bc76660ec034145b5abf7d1068419ac2316626ad9
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7B215E75900305ABDB209F29DC44AAA7BA4EF45724F244A19EEE1D72E0DBB09940EF60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00F405C6
                                                                                                                                                                                                                                                                                                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F40601
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                                                                                                                      • String ID: nul
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b77cee02ba65c305d4526cce1ecf41bce7306c26c70ad8b95eb5373bdb084b59
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 31a2a66547898df9437d24b0897c100ca35ed2e4cf084c1687905c6267b61c4c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b77cee02ba65c305d4526cce1ecf41bce7306c26c70ad8b95eb5373bdb084b59
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D92183759003059BDB209F698C14A6A7BE4AF95730F204A19FEE2E72D0DBB09860EB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00ED604C
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED600E: GetStockObject.GDI32(00000011), ref: 00ED6060
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED606A
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00F64112
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00F6411F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00F6412A
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00F64139
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00F64145
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: Msctls_Progress32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9520a7e04512df056b124f66f4e9a8f2e87c9346f5a6852e60a43234b2ebc976
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 35c83d11b1acb4e7a3c33fa8513263a572153d234890d8925f910fef6584d21d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9520a7e04512df056b124f66f4e9a8f2e87c9346f5a6852e60a43234b2ebc976
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7E1193B215021D7EEF119E64CC85EE77F5DEF09798F014111BA18A2150C6769C61ABA4
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F0D7A3: _free.LIBCMT ref: 00F0D7CC
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D82D
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D838
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D843
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D897
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D8A2
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D8AD
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D8B8
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e2a60286c13dcd70f956bb8557ac41d35ab3dbd924911d6c808809d5dcaecf59
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A1112E71940B04AAD665BFF4CC4BFCBBBECAF44700F804825B299A64D2DA79B505B660
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F3DA74
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000), ref: 00F3DA7B
                                                                                                                                                                                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F3DA91
                                                                                                                                                                                                                                                                                                                                                      • LoadStringW.USER32(00000000), ref: 00F3DA98
                                                                                                                                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F3DADC
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00F3DAB9
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                                                                                                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 91df52bb5d06dfbf903f2a28672a63c6a1b6f549750da7dfddb92dc2e57dc9d6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 58c7d82f391fac4a34b724d17430c6caa448279240f83b2041ab856baf92cf6b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 91df52bb5d06dfbf903f2a28672a63c6a1b6f549750da7dfddb92dc2e57dc9d6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CF0162F290020C7FEB10ABA4DD89EF7726CE708711F400492F796E2042E6B49E845FB4
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(00FEE250,00FEE250), ref: 00F4097B
                                                                                                                                                                                                                                                                                                                                                      • EnterCriticalSection.KERNEL32(00FEE230,00000000), ref: 00F4098D
                                                                                                                                                                                                                                                                                                                                                      • TerminateThread.KERNEL32(?,000001F6), ref: 00F4099B
                                                                                                                                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00F409A9
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F409B8
                                                                                                                                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(00FEE250,000001F6), ref: 00F409C8
                                                                                                                                                                                                                                                                                                                                                      • LeaveCriticalSection.KERNEL32(00FEE230), ref: 00F409CF
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3495660284-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f3657526b0db5dadf3c940050a0c61c278f222afb68f8743dec1fdcad43422b0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b9d4bc3a99e2238a4621efc6440102f70e72e629453b791e8a0854666f60c96e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f3657526b0db5dadf3c940050a0c61c278f222afb68f8743dec1fdcad43422b0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E7F03131442506BBD7415FA5EE9DBE67B35FF01712F401015F691508A0CBB59465EFE0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00ED5D30
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00ED5D71
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00ED5D99
                                                                                                                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00ED5ED7
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00ED5EF8
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1296646539-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1e961c9e193d32cb5737bc793ed6c4b3d8e7ae1de2f5cf6b32b7c2db1a19ffa6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 00b6c4bbf69a5b0540ef9ad4e8583818f39db58dc9041b49b272e626a8101ea8
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1e961c9e193d32cb5737bc793ed6c4b3d8e7ae1de2f5cf6b32b7c2db1a19ffa6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5FB18C35A0074ADBDB10DFA9C4807EEB7F1FF58320F14951AE8A9E7250DB30AA91DB54
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 00F000BA
                                                                                                                                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F000D6
                                                                                                                                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 00F000ED
                                                                                                                                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F0010B
                                                                                                                                                                                                                                                                                                                                                      • __allrem.LIBCMT ref: 00F00122
                                                                                                                                                                                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F00140
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1992179935-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c9ebbac99738b6a0f89055187a369d5b971c20873014b5e11372f7b9ae99fabf
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7281D872A00B069BE7249E68CC41B6BB3E9AF45734F24463AF651D62C1EB74D940B790
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F53149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00F5101C,00000000,?,?,00000000), ref: 00F53195
                                                                                                                                                                                                                                                                                                                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00F51DC0
                                                                                                                                                                                                                                                                                                                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00F51DE1
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F51DF2
                                                                                                                                                                                                                                                                                                                                                      • inet_ntoa.WSOCK32(?), ref: 00F51E8C
                                                                                                                                                                                                                                                                                                                                                      • htons.WSOCK32(?,?,?,?,?), ref: 00F51EDB
                                                                                                                                                                                                                                                                                                                                                      • _strlen.LIBCMT ref: 00F51F35
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F339E8: _strlen.LIBCMT ref: 00F339F2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00EECF58,?,?,?), ref: 00ED6DBA
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00EECF58,?,?,?), ref: 00ED6DED
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1923757996-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3d48e245eabe47e91604e1e80e6c2edeec95b707aebe4d86eac70c69a054d777
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 88a075e8d91f221bd623fd418bf478e37c91a5886c282ce4b66d70ffe4f8ba7a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3d48e245eabe47e91604e1e80e6c2edeec95b707aebe4d86eac70c69a054d777
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0DA1CE31604340AFC324DB24C885F2A7BE5BF84328F54994DF9566B2A2CB71ED4ADB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00EF82D9,00EF82D9,?,?,?,00F0644F,00000001,00000001,?), ref: 00F06258
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00F0644F,00000001,00000001,?,?,?,?), ref: 00F062DE
                                                                                                                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00F063D8
                                                                                                                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F063E5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F03820: RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F063EE
                                                                                                                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F06413
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1414292761-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ab7c8a0c069f30054eb64f623d59ab76d919b897769b24d88b542fafc45f9ebd
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 4873cb8a7ce7a7298f531373502843b0a1f2ff65bf91c488e5fc5d6a5ad1f46f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ab7c8a0c069f30054eb64f623d59ab76d919b897769b24d88b542fafc45f9ebd
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 52519072A00216ABDB258F64DD81EBF77AAEF44760F154629F905D62C0DB34DC60F6A0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5B6AE,?,?), ref: 00F5C9B5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5C9F1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA68
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA9E
                                                                                                                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5BCCA
                                                                                                                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F5BD25
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F5BD6A
                                                                                                                                                                                                                                                                                                                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00F5BD99
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F5BDF3
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00F5BDFF
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1120388591-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b4e885cede6212d4b56aa7f110d3992ab3482b5e07465acdf47948ca4bf093da
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 25cf19a20f1f5df71442be76e58b6cc242a11fe80959577770b1cb6bbba2c0d9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b4e885cede6212d4b56aa7f110d3992ab3482b5e07465acdf47948ca4bf093da
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 12819E31608241AFC714DF24C895E2ABBF5FF84318F14856DF9958B2A2DB31ED09DB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(00000035), ref: 00F2F7B9
                                                                                                                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(00000001), ref: 00F2F860
                                                                                                                                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(00F2FA64,00000000), ref: 00F2F889
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(00F2FA64), ref: 00F2F8AD
                                                                                                                                                                                                                                                                                                                                                      • VariantCopy.OLEAUT32(00F2FA64,00000000), ref: 00F2F8B1
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F2F8BB
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3859894641-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d03ba7d5f14aa5cbed12cec9b999a381379f50f0f40b83fa093b328df74abdc8
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 528e734bf77bbcf94db8eb7bf0053ef1c1c9942629250542b672ba5e9a8b5e25
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d03ba7d5f14aa5cbed12cec9b999a381379f50f0f40b83fa093b328df74abdc8
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AF51D731920324BADF10AB65EC95B29B3F4EF45310B205477E805EF291DB748C84E796
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                                                                                                                                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00F494E5
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F49506
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F4952D
                                                                                                                                                                                                                                                                                                                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00F49585
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                                                                                                                                      • String ID: X
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 19ccc10f830986126f6160438136e7c73465e65a1cd5a51b0b27d6785eed5d60
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f61094a34bdf45d196b5d05636a5d2be18ddfcad6f4db4f4c99ac1c455ab3806
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 19ccc10f830986126f6160438136e7c73465e65a1cd5a51b0b27d6785eed5d60
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 20E19131A083418FD714DF24C881A6BBBE5FF85314F14856EE889AB3A2DB71DD05DB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                                                                                                                                                                      • BeginPaint.USER32(?,?,?), ref: 00EE9241
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00EE92A5
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00EE92C2
                                                                                                                                                                                                                                                                                                                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00EE92D3
                                                                                                                                                                                                                                                                                                                                                      • EndPaint.USER32(?,?,?,?,?), ref: 00EE9321
                                                                                                                                                                                                                                                                                                                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00F271EA
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9339: BeginPath.GDI32(00000000), ref: 00EE9357
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3050599898-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9a77512d9c50e5da77943166f26123ad855ba4423776a6db69c24fa76278f378
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a0dc174edd09f8269b3feaae1ade423fb64ce7ad684e128e1162a9e18fa8f6ab
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9a77512d9c50e5da77943166f26123ad855ba4423776a6db69c24fa76278f378
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A419D70104358AFD721DF25D884FBA7BE8EF4A760F140229F9A4971E2C7719845EB62
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 00F4080C
                                                                                                                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00F40847
                                                                                                                                                                                                                                                                                                                                                      • EnterCriticalSection.KERNEL32(?), ref: 00F40863
                                                                                                                                                                                                                                                                                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00F408DC
                                                                                                                                                                                                                                                                                                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00F408F3
                                                                                                                                                                                                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F40921
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3368777196-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 114ce7a66f2c085a0ffcda5e7ddebd99a0abb41ab3237feab385a9fb8f957cee
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8b9ac1c6ef9d631e47b2aa68783fd599631380b61835c154e03e9919d934dc73
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 114ce7a66f2c085a0ffcda5e7ddebd99a0abb41ab3237feab385a9fb8f957cee
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 54415E71900209EBDF149F55DC85A6A7BB8FF04310F1440A5ED00AA2A7DB70EE65EBA4
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00F2F3AB,00000000,?,?,00000000,?,00F2682C,00000004,00000000,00000000), ref: 00F6824C
                                                                                                                                                                                                                                                                                                                                                      • EnableWindow.USER32(?,00000000), ref: 00F68272
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00F682D1
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(?,00000004), ref: 00F682E5
                                                                                                                                                                                                                                                                                                                                                      • EnableWindow.USER32(?,00000001), ref: 00F6830B
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00F6832F
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 642888154-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ea38265326bf15a11f529573e1a1d4fae2408fe52ca65459c163d7cead954435
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: dd5e4dcdcdf529a048cf4601a7b908238baae426c69654e0152bc6db4edbdacc
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ea38265326bf15a11f529573e1a1d4fae2408fe52ca65459c163d7cead954435
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DF41C570A01648AFDB21CF15CCA9BE57BE0FB0A764F19436DE5584B262CB71A842EF50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 00F34C95
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F34CB2
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F34CEA
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F34D08
                                                                                                                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F34D10
                                                                                                                                                                                                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 00F34D1A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 72514467-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: fd7c85bdd8f185a79215b72b4198eefb0624ea797147f26209800cb925335bb0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 56752c3b803e2c2d820813b4488cf4dd9eda37e834dd283bc00fb4e38ccddd68
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fd7c85bdd8f185a79215b72b4198eefb0624ea797147f26209800cb925335bb0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 962129726042057BEB155B35EC09E7B7BDCDF45770F108029F809DA1A2EAA1FC00A6A0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED3A97,?,?,00ED2E7F,?,?,?,00000000), ref: 00ED3AC2
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F4587B
                                                                                                                                                                                                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00F45995
                                                                                                                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(00F6FCF8,00000000,00000001,00F6FB68,?), ref: 00F459AE
                                                                                                                                                                                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00F459CC
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: .lnk
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e21549efcee53bccd517b0e614047c1558cc7777d8fbc7594ac32e36a5ea24c7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ea7b60c9c5c3d94195ae71acb764f5db180eee369e70e99b555eb0a4b26e1657
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e21549efcee53bccd517b0e614047c1558cc7777d8fbc7594ac32e36a5ea24c7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95D15571A08701DFC714EF24C480A2ABBE5EF89B24F14495DF8899B362DB31EC45DB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F30FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F30FCA
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F30FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F30FD6
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F30FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F30FE5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F30FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F30FEC
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F30FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F31002
                                                                                                                                                                                                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000000,00F31335), ref: 00F317AE
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F317BA
                                                                                                                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00F317C1
                                                                                                                                                                                                                                                                                                                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F317DA
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00F31335), ref: 00F317EE
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F317F5
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3008561057-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 83b80d3d3f08ac712547760291371b7fbd2bdfd24e92fa0e307d4fb017f92a70
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c2f37a0b64b5dabe0257625821a6591cbba509e9bdc55806e3d50a5bc5c5a9c8
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 83b80d3d3f08ac712547760291371b7fbd2bdfd24e92fa0e307d4fb017f92a70
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 97118E32900209FFDB209FA4CC49BBF7BA9FB46365F184119F49197211D77AA944EBB0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00F314FF
                                                                                                                                                                                                                                                                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00F31506
                                                                                                                                                                                                                                                                                                                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00F31515
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000004), ref: 00F31520
                                                                                                                                                                                                                                                                                                                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F3154F
                                                                                                                                                                                                                                                                                                                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00F31563
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1413079979-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6b44f2936b7a2107c58854bff58bd5278c91d72607426933f28b4aee5ffe87ff
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 44e413c78027b6c3e6d1c58de4aa1dced3b2a813651030c187d7604e44d3457b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6b44f2936b7a2107c58854bff58bd5278c91d72607426933f28b4aee5ffe87ff
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0211597250020DABDF11CF98DD49BEE7BA9FF49764F044015FA95A2160C3B18E60EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,00EF3379,00EF2FE5), ref: 00EF3390
                                                                                                                                                                                                                                                                                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00EF339E
                                                                                                                                                                                                                                                                                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00EF33B7
                                                                                                                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00EF3379,00EF2FE5), ref: 00EF3409
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3852720340-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: aba2a28e5f8a35e0ed015a3df9baa5daa370a56b4a7bd0b8febba4243dff9c99
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c507616acfa497358faa3a46efb5aa52453f6480b8e6b4799ea29b16f355945b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aba2a28e5f8a35e0ed015a3df9baa5daa370a56b4a7bd0b8febba4243dff9c99
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AF01243320A31DBEAA2567747C86A773ED4EB0537DB60222AF730E02F0EF514E116194
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,00F05686,00F13CD6,?,00000000,?,00F05B6A,?,?,?,?,?,00EFE6D1,?,00F98A48), ref: 00F02D78
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02DAB
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02DD3
                                                                                                                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,00EFE6D1,?,00F98A48,00000010,00ED4F4A,?,?,00000000,00F13CD6), ref: 00F02DE0
                                                                                                                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,00EFE6D1,?,00F98A48,00000010,00ED4F4A,?,?,00000000,00F13CD6), ref: 00F02DEC
                                                                                                                                                                                                                                                                                                                                                      • _abort.LIBCMT ref: 00F02DF2
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3160817290-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4ad9cc665e92777e9249ed0c48790646511de63cd6027b4f12056017a0d9acb6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 3c3a6532aee50fcba7838f6b3b0eadcc090aba462ef5997e56b0f0b8ec062c9d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4ad9cc665e92777e9249ed0c48790646511de63cd6027b4f12056017a0d9acb6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A7F0CD3690650067C6A237397C0EE1E365D6FC1775F354415F864921D2DE68CC017170
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EE9693
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9639: SelectObject.GDI32(?,00000000), ref: 00EE96A2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9639: BeginPath.GDI32(?), ref: 00EE96B9
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9639: SelectObject.GDI32(?,00000000), ref: 00EE96E2
                                                                                                                                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00F68A4E
                                                                                                                                                                                                                                                                                                                                                      • LineTo.GDI32(?,00000003,00000000), ref: 00F68A62
                                                                                                                                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00F68A70
                                                                                                                                                                                                                                                                                                                                                      • LineTo.GDI32(?,00000000,00000003), ref: 00F68A80
                                                                                                                                                                                                                                                                                                                                                      • EndPath.GDI32(?), ref: 00F68A90
                                                                                                                                                                                                                                                                                                                                                      • StrokePath.GDI32(?), ref: 00F68AA0
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 43455801-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e7fdc2225c3f6593a0cbed9fdb6ae762690269bf155a7d199d62e0c3b471f9ac
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ab33122d6432ef8c4603edcc3f58006bc654debc4b3dd413d62f8071478586f1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e7fdc2225c3f6593a0cbed9fdb6ae762690269bf155a7d199d62e0c3b471f9ac
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3511097600014DFFDF129F94DC88EAA7FACEB08390F008012FA699A1A1C7719D55EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00F35218
                                                                                                                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F35229
                                                                                                                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F35230
                                                                                                                                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00F35238
                                                                                                                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F3524F
                                                                                                                                                                                                                                                                                                                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00F35261
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CapsDevice$Release
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1035833867-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d471534f294b170ce6c84e3a5ef2c9e03fc6e3032dc63ba80b21fe3e73fca9a7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 828654e781799caa917c228db51069442823076e21fe1852ae217839081883a5
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d471534f294b170ce6c84e3a5ef2c9e03fc6e3032dc63ba80b21fe3e73fca9a7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 62016275E01718BBEB109BA59C49E5EBFB8EF48761F044066FA49E7281D6B1DC00DFA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00ED1BF4
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00ED1BFC
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00ED1C07
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00ED1C12
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00ED1C1A
                                                                                                                                                                                                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ED1C22
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Virtual
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4278518827-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4c3224b0e7e9f1bf475be08068d13be393e6823eafd59037dceffe4edf63e05b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: bc72e9a3acc1946d024504ecf12baaf5cb09e241288932c9c864ed73892a688f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4c3224b0e7e9f1bf475be08068d13be393e6823eafd59037dceffe4edf63e05b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 500167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BE15C4BA42C7F5A864CBE5
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F3EB30
                                                                                                                                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F3EB46
                                                                                                                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00F3EB55
                                                                                                                                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F3EB64
                                                                                                                                                                                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F3EB6E
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F3EB75
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 839392675-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4592c01941c76a88c9d10c13da2c85421a5dcf9fda3ac55eaa9a5e7131ef6c0e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 96afd0186f5c883b6f60a2b021a372725cc85c858e49206bc16764875d3288c1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4592c01941c76a88c9d10c13da2c85421a5dcf9fda3ac55eaa9a5e7131ef6c0e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 01F01D72540158BBE6216752DC0EEBF7A7CEFCAB11F000158F6A2D119196E15A01A6F5
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetClientRect.USER32(?), ref: 00F27452
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00F27469
                                                                                                                                                                                                                                                                                                                                                      • GetWindowDC.USER32(?), ref: 00F27475
                                                                                                                                                                                                                                                                                                                                                      • GetPixel.GDI32(00000000,?,?), ref: 00F27484
                                                                                                                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00F27496
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000005), ref: 00F274B0
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 272304278-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: cb927eeefb546717086f9df48e4507900540b17482ff2efb89fc884f140a728f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 41184a9f823e7f4528cffa954610b1721e1e7c325fe531a6513fd35481da0704
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cb927eeefb546717086f9df48e4507900540b17482ff2efb89fc884f140a728f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E01A231400219EFDB10AF64DC08BF97BB5FF04321F154060F9AAA21A1CB711D41FB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F3187F
                                                                                                                                                                                                                                                                                                                                                      • UnloadUserProfile.USERENV(?,?), ref: 00F3188B
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F31894
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F3189C
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00F318A5
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F318AC
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 146765662-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 611dd177edbddc9c858cca2bcf74306aca5996f970988b5929e0356f2e6ce7c3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 1c0ff007bff107716fb8417eb6d2e671c113708a4aacbdbdb5300a9eafc42536
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 611dd177edbddc9c858cca2bcf74306aca5996f970988b5929e0356f2e6ce7c3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34E0ED36004109BBDB016FA2ED0C915BF39FF4A7227108221F2F581171CBB25420FFA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F3C6EE
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F3C735
                                                                                                                                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F3C79C
                                                                                                                                                                                                                                                                                                                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F3C7CA
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 727e740017e888089171c60c609a5ec87789d1539db8799057c37a4e501fca1b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6efe83956483c4c5e5e9c2c72376fcfb38f4c914057ceb588d64b4b1e1f8394a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 727e740017e888089171c60c609a5ec87789d1539db8799057c37a4e501fca1b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5251B072A143019BD7149F28C885B6B77E8AF89330F040A2DF995F31E1DB60DD04EBA2
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00F5AEA3
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                                                                                                                                                                      • GetProcessId.KERNEL32(00000000), ref: 00F5AF38
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F5AF67
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: <$@
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0405fd057fc71ee57b304554109f2dfbda7836a1a1478dd6b96fe55cdf288478
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 296a24e099643acec392043d3cb6f8768caaa67d169ac12b2c3f8c1dfa848bd1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0405fd057fc71ee57b304554109f2dfbda7836a1a1478dd6b96fe55cdf288478
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8A71AB70A00619CFCB14DF54D485A9EBBF0FF08310F04859AE956AB3A2DB70ED46DB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F37206
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F3723C
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F3724D
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F372CF
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                                                                                                                                      • String ID: DllGetClassObject
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9171a7c7b1787c981a55b6767f80eff3e3044d831018a15b40f6d8c1984b61a4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 313bdf079ca103ed12a6610c57b60132a1287439d0d6cd9904c018582fb8b08b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9171a7c7b1787c981a55b6767f80eff3e3044d831018a15b40f6d8c1984b61a4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 49416CB1A04305EFDB25DF54C884A9B7BA9EF49320F1480A9BD059F24AD7B4D944EFA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F63E35
                                                                                                                                                                                                                                                                                                                                                      • IsMenu.USER32(?), ref: 00F63E4A
                                                                                                                                                                                                                                                                                                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F63E92
                                                                                                                                                                                                                                                                                                                                                      • DrawMenuBar.USER32 ref: 00F63EA5
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: da377fe7de1d1aedcf3d2fc3778d46280c59e9abc075d1231fca29c6809ee0e4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ae9b61fc935a232cadf45fc6143c249519bcc3e541732353a9b105389d0131e2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: da377fe7de1d1aedcf3d2fc3778d46280c59e9abc075d1231fca29c6809ee0e4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E74187B5A00209AFDB10DF50D880AAABBF9FF59360F044029F941A7250D735AE08EFA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F31E66
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F31E79
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F31EA9
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5d78d1bc12918e2113e5600b64f11f487c842f4316b83cad9809307c434fa040
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d5c222562c768837927344171af65b93948da4a0e2d66bc477724b446b69bfcc
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5d78d1bc12918e2113e5600b64f11f487c842f4316b83cad9809307c434fa040
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4B214771A00108BEDB14AB60DC45CFFB7F8EF41370F10411AF865A72E1DB7A5D4AA620
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 176396367-4004644295
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 74cc27d49a5ff17b42ae2c8b3d7d1cb9df294f25ef736dc2e37e5c829c745003
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a455511cc06421f16f369a6b05665d11d6cc8d0830fd2762066216dd350da595
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 74cc27d49a5ff17b42ae2c8b3d7d1cb9df294f25ef736dc2e37e5c829c745003
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2531C872E0036E4ECB20EE6C996017F3B919BA1761B154029EE466B245E679CD49F3D0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00F62F8D
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryW.KERNEL32(?), ref: 00F62F94
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00F62FA9
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00F62FB1
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: SysAnimate32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5b069315c3719b40dca26119625bf724a2a1a23d04ec72c37b5dae5c61238fdf
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 93320aa270841b595b69856333b5f478e4b8edbdd83e86e88ccab416b53aefc9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5b069315c3719b40dca26119625bf724a2a1a23d04ec72c37b5dae5c61238fdf
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E219D71704609ABEB504FA4DC80EBB37B9EB59374F104619F950D6190D7B1DC51A7A0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00EF4D1E,00F028E9,?,00EF4CBE,00F028E9,00F988B8,0000000C,00EF4E15,00F028E9,00000002), ref: 00EF4D8D
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00EF4DA0
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00EF4D1E,00F028E9,?,00EF4CBE,00F028E9,00F988B8,0000000C,00EF4E15,00F028E9,00000002,00000000), ref: 00EF4DC3
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                                                                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 23633af44d2e69675f785500f3a884cb631c6cf521e0c6fbc6b86fef358da782
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ffdcb8702833e16eb271cd3a1796a3f76b3c77b7fa2124f8814ca1a9db0bd32c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23633af44d2e69675f785500f3a884cb631c6cf521e0c6fbc6b86fef358da782
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DFF0AF30A0020CBBDB149F90DC09BBEBBF4EF44716F0000A5F949A22A1CB719A40EBD1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00ED4EDD,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E9C
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00ED4EAE
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00ED4EDD,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4EC0
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                                                                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d5ed050f3090fedf957cbdcb7ffe44abcd8288db9e6da76615eade3e7724bf6b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5ed4c10bd9f3aadc5b5f8b7907a8f1dc13a19d802180af79f909242959c548cf
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d5ed050f3090fedf957cbdcb7ffe44abcd8288db9e6da76615eade3e7724bf6b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7AE08635A015226B922117256C18A7B7654EF92B667090117FC80E6241DBB0CD0250E1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F13CDE,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E62
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00ED4E74
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00F13CDE,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E87
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                                                                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 998bccd6e8ba0f07d0a2671a293d95d9a302c8fa757dcbb1a167a80854dedce7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: eb80d34e233b64ae3c0ef190be67be87155bae072bf050f83a0c65f6141c1d6f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 998bccd6e8ba0f07d0a2671a293d95d9a302c8fa757dcbb1a167a80854dedce7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3D0C231502662675B221B24AC08DAB3B18EFC6B593050212FD80BA255CFB0CD02A1D0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F42C05
                                                                                                                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?), ref: 00F42C87
                                                                                                                                                                                                                                                                                                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00F42C9D
                                                                                                                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F42CAE
                                                                                                                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F42CC0
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: File$Delete$Copy
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3226157194-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 14dfee51bbedd8451bb63527063545442570d0453ac301d061660608652359c4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 1a910116f2671dbb1e64733ff170afb86eb5e2605a95dd689701d52d904f8d7a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 14dfee51bbedd8451bb63527063545442570d0453ac301d061660608652359c4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2FB16E72D0011DABDF11DBA4CC85EEEBBBDEF48310F4040A6FA09E6251EA349A449F61
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 00F5A427
                                                                                                                                                                                                                                                                                                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F5A435
                                                                                                                                                                                                                                                                                                                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F5A468
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00F5A63D
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3488606520-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 2d413ef6b56c0927eabd037991bf6c0c6854ebe2226ba491b41185b91d52837d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9700d1dcae2ffc8a92f43f6e46e2b97b14561103919073b2361bbb3b9c6d15d2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2d413ef6b56c0927eabd037991bf6c0c6854ebe2226ba491b41185b91d52837d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7DA18C716043019FD720DF24C886B2AB7E5EF84714F14991DFAAA9B392D7B0EC45CB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F3CF22,?), ref: 00F3DDFD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F3CF22,?), ref: 00F3DE16
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3E199: GetFileAttributesW.KERNEL32(?,00F3CF95), ref: 00F3E19A
                                                                                                                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00F3E473
                                                                                                                                                                                                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 00F3E4AC
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F3E5EB
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F3E603
                                                                                                                                                                                                                                                                                                                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00F3E650
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3183298772-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 02fca75195916f259c747a76a6697cc6167971ef3ab69c1258304e0f1565e8f4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 476673411512ea2ee72943e626caec0e19bf878ebc94b185ace249b7c23cef7a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 02fca75195916f259c747a76a6697cc6167971ef3ab69c1258304e0f1565e8f4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 995184B25083459BC724EB90DC819EFB7ECAF84360F00491EF6C9D3191EF75A6889766
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5B6AE,?,?), ref: 00F5C9B5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5C9F1
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA68
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA9E
                                                                                                                                                                                                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5BAA5
                                                                                                                                                                                                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F5BB00
                                                                                                                                                                                                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00F5BB63
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00F5BBA6
                                                                                                                                                                                                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F5BBB3
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 826366716-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 83296630c47b20d0cfe0169186a9a126243174858d6d92dd8a880735873db7a0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 57ae4b7f79c5ff8aeb1773684dfd3f2423148935a2b2fe8c69ae6d25557e3293
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 83296630c47b20d0cfe0169186a9a126243174858d6d92dd8a880735873db7a0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F061D431608241EFD314DF14C890E2ABBE5FF84318F14855DF9998B2A2DB35ED4ADB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00F38BCD
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32 ref: 00F38C3E
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32 ref: 00F38C9D
                                                                                                                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00F38D10
                                                                                                                                                                                                                                                                                                                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F38D3B
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4136290138-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ace23f4205ed1a99c295cc1d6da71c305dd5df8a643941c559c856d5faa1cd4e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 99eac1411064a94403a897d7ac2450a8b1a0e4b2e5146c4d195d4d825357af65
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ace23f4205ed1a99c295cc1d6da71c305dd5df8a643941c559c856d5faa1cd4e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8C516BB5A00219EFCB10CF58C884AAAB7F4FF89360F158559F955DB350EB34E912CBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00F48BAE
                                                                                                                                                                                                                                                                                                                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00F48BDA
                                                                                                                                                                                                                                                                                                                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00F48C32
                                                                                                                                                                                                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00F48C57
                                                                                                                                                                                                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00F48C5F
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2832842796-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: da2850d8a3a27159f95a195a1455e8703b44eb2fbd7f7614a02397514641e979
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0d25d11451f652fb5c5193a1356e51fc6b9ab8564a09a798c28d06848fbe9910
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: da2850d8a3a27159f95a195a1455e8703b44eb2fbd7f7614a02397514641e979
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 18515A35A002199FCB04DF65C880A6DBBF5FF48354F088459E949AB3A2DB31ED42DB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00F58F40
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00F58FD0
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F58FEC
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00F59032
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00F59052
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00F41043,?,753CE610), ref: 00EEF6E6
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00F2FA64,00000000,00000000,?,?,00F41043,?,753CE610,?,00F2FA64), ref: 00EEF70D
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 666041331-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c6fc5d21fc27b44bd00e10dcbe4822ad00d0dba0197d43a317560b5b13b36715
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a5905f9ad04741839716697953f4e7029167cd7581caae530e5bbe07f678980e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c6fc5d21fc27b44bd00e10dcbe4822ad00d0dba0197d43a317560b5b13b36715
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A9516A35A04205DFC704DF68C4848ADBBF1FF49324B058099ED5AAB362DB31ED8ADB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00F66C33
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 00F66C4A
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00F66C73
                                                                                                                                                                                                                                                                                                                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00F4AB79,00000000,00000000), ref: 00F66C98
                                                                                                                                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00F66CC7
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3688381893-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 077c02c3c8541cf6caa7884aff8e2fb299a4bd75210e293d7fabcded808f0d68
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 4b3f1f698752a0d257af493a555ce93ecaedf59962459c4dbcfd39c35b80045d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 077c02c3c8541cf6caa7884aff8e2fb299a4bd75210e293d7fabcded808f0d68
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2341B635A04504AFD724DF28CD54FB57BA5EB49361F150268F899E73E0C371AD41EA90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 653d12fa448bc2994f2fd75567d863d9f26881bd1ac31d24d0f5116ba2b019de
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 566ce212fafe736c03a264a168393b0a431d349b60e43c51a3b845686d8a19f1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 653d12fa448bc2994f2fd75567d863d9f26881bd1ac31d24d0f5116ba2b019de
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8941E232E002049FCB20DF78C884A5DB3F5EF89724F1545A9E615EB3A1DB31AD01EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00EE9141
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(00000000,?), ref: 00EE915E
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000001), ref: 00EE9183
                                                                                                                                                                                                                                                                                                                                                      • GetAsyncKeyState.USER32(00000002), ref: 00EE919D
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4210589936-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b435577957284cc726dbc016fe4ef1becb48ebccd1f427c47fd9209e73449089
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 95f574c9f9ccb66becae36da2f69482328b30c8b86a28852957474e87bf83696
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b435577957284cc726dbc016fe4ef1becb48ebccd1f427c47fd9209e73449089
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EA417F31A0861AFBDF09AF65D844BEEB7B4FF05324F208219E469A3291C7346950DB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetInputState.USER32 ref: 00F438CB
                                                                                                                                                                                                                                                                                                                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00F43922
                                                                                                                                                                                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 00F4394B
                                                                                                                                                                                                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 00F43955
                                                                                                                                                                                                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F43966
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2256411358-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8f813a64b6c799ee9031874d7cfa646409fd243c776496caca6b76e662a7a2bd
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c1df5f1b259eb5fb9bb0e234ebaf95ffef48326934c87be2cab3fd5892d68df1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8f813a64b6c799ee9031874d7cfa646409fd243c776496caca6b76e662a7a2bd
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1D31A8B1D043499EFB35CB359C48BB77FA9BB06314F040559D8A2821A0E7F49A84FB51
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00F4C21E,00000000), ref: 00F4CF38
                                                                                                                                                                                                                                                                                                                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 00F4CF6F
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,00F4C21E,00000000), ref: 00F4CFB4
                                                                                                                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,00F4C21E,00000000), ref: 00F4CFC8
                                                                                                                                                                                                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,00F4C21E,00000000), ref: 00F4CFF2
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3191363074-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 634112fba6d00fda889a9e41ee812aeb6580fc776aabd9a1400d71b6b8fc38fc
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9ea5593743f955f1cdf47d37e9263037bf83ef0a19780596a4881fd942876d6b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 634112fba6d00fda889a9e41ee812aeb6580fc776aabd9a1400d71b6b8fc38fc
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DD318271901209EFDB60DFA5C884AABBFF9EB14320B10442EF956D3101D734AD44EBB0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F31915
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 00F319C1
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 00F319C9
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 00F319DA
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00F319E2
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3382505437-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e32cf225bf35f94b056a654a401b9dccdba41b2f529d5089b649104c9cdac24b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0588a6a6a8ef255290f85b3777c878847f0f71c10aa144e904218e10bc99bd39
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e32cf225bf35f94b056a654a401b9dccdba41b2f529d5089b649104c9cdac24b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: ED31AF72900219EFCB14CFA8CD99BEE3BB5FB05325F104225F965A72D1C7B09954EB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00F65745
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00F6579D
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F657AF
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F657BA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F65816
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 763830540-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 038805fea6aa689d2cb741d91a3e7d4525e99a4f315376efde44a693b4998afe
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 13b98d34078f10aa4ab0391bcf414884be055f1b7624971adbbe38244f3a3cbf
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 038805fea6aa689d2cb741d91a3e7d4525e99a4f315376efde44a693b4998afe
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 22219171D0461D9ADB20DFA0CC84AEE77B8FF04B24F108256E969FA181DBB08985DF50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • IsWindow.USER32(00000000), ref: 00F50951
                                                                                                                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00F50968
                                                                                                                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00F509A4
                                                                                                                                                                                                                                                                                                                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 00F509B0
                                                                                                                                                                                                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000003), ref: 00F509E8
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4156661090-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5447047f3c5cbf989b1a1dd89fb673e08319c0f0b79fa7c7adb315c4d6fbd41e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f06b5c69a14cc155aefcb064eb3a1b1698c04b9cd3a81bbda0ebce4c9d210099
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5447047f3c5cbf989b1a1dd89fb673e08319c0f0b79fa7c7adb315c4d6fbd41e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95218135600204AFD714EF65DC84AAEBBE9FF44701F048069F89AE7362DB70AC44DB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00F0CDC6
                                                                                                                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00F0CDE9
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F03820: RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00F0CE0F
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0CE22
                                                                                                                                                                                                                                                                                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00F0CE31
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 336800556-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f0160a7890200416b9ba670bb1c796aa33906fc189ea24c2fc01f19b03589d44
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 049b0197a63c1f104a8d0a13a53e93bc0fcfc652b4e3aed0704c530c6aafe7ea
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f0160a7890200416b9ba670bb1c796aa33906fc189ea24c2fc01f19b03589d44
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1901D472A022157FA32127BAAC8CD7F796DDFC6BA1315022AFD05C7280EA608D01B1F0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EE9693
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,00000000), ref: 00EE96A2
                                                                                                                                                                                                                                                                                                                                                      • BeginPath.GDI32(?), ref: 00EE96B9
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,00000000), ref: 00EE96E2
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3225163088-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e2da9afddd50d29e2fd2ba92030543713313c772f1468efe0924e9e268e3d4d8
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e834fd67bb231d7ebc05e603c62d9656da12b7915afc6d8a2621b92fe534e998
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e2da9afddd50d29e2fd2ba92030543713313c772f1468efe0924e9e268e3d4d8
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 222180B080238EEBDB119F65EC147EA3BB8BB06365F110216F460A61B2D3B05995EB94
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000008), ref: 00EE98CC
                                                                                                                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 00EE98D6
                                                                                                                                                                                                                                                                                                                                                      • SetBkMode.GDI32(?,00000001), ref: 00EE98E9
                                                                                                                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000005), ref: 00EE98F1
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00EE9952
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Color$LongModeObjectStockTextWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1860813098-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 98b6492d5915add697d2f53089febf79d1e74ada42a21866184d593905be2114
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9253d905386431f152d9874e61cf735dfaede5977c31cb1774970d8f7ea96138
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 98b6492d5915add697d2f53089febf79d1e74ada42a21866184d593905be2114
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3C1136315452D89FCB218B22EC55AFA3BA0EB53334F09015EE5E2AA1B3C6760940DB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _memcmp
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2931989736-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: dd1e3beff65336a4d0f59764905b00466c92c0832d194b53239e64d9cd934e9a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 532fd16d162095edb11307af17ac50357a28669189b1e656e2936efaaba74aa1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dd1e3beff65336a4d0f59764905b00466c92c0832d194b53239e64d9cd934e9a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0001D862A4660DFBD2085510AD82FBB739D9FB1BB4F414020FE04AF241F760ED14E2E1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,00EFF2DE,00F03863,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6), ref: 00F02DFD
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02E32
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02E59
                                                                                                                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,00ED1129), ref: 00F02E66
                                                                                                                                                                                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,00ED1129), ref: 00F02E6F
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorLast$_free
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3170660625-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8513d7cb27a0ac3dd65e871e3bfb15bef64368a2e40b7d8153bc4b701923bb57
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 184b446fbd01da4a5e902e15b7dcfc07e6591f2d7377f12ea824deea8d5f08a2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8513d7cb27a0ac3dd65e871e3bfb15bef64368a2e40b7d8153bc4b701923bb57
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B701287768560467C6623735EC8EE2B366DAFD17B1B614029F865A22D2EF78CC017170
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?,?,00F3035E), ref: 00F3002B
                                                                                                                                                                                                                                                                                                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30046
                                                                                                                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30054
                                                                                                                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?), ref: 00F30064
                                                                                                                                                                                                                                                                                                                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30070
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3897988419-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 233af84129cd90a3a7801688742f82da774381627ffa2cc6786919df82544560
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e0a746b10509bbe1307bfdeee4d5b0a95191e6f44fa2ce0e6efb4e25f67a9289
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 233af84129cd90a3a7801688742f82da774381627ffa2cc6786919df82544560
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B901A2B2600218BFDB245F68DC44BBE7AEDEF44761F144125F985D3210DBB5DD40ABA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 00F3E997
                                                                                                                                                                                                                                                                                                                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 00F3E9A5
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 00F3E9AD
                                                                                                                                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 00F3E9B7
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32 ref: 00F3E9F3
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2833360925-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f49720ec7fba4fa7d41a7484d1811c85f73e519a85b55a00f18f5dc1056fb5a4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: be7c05306afa43646a545ce5c30b76d3bddae01dee9eb4342272207ba7d487a7
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f49720ec7fba4fa7d41a7484d1811c85f73e519a85b55a00f18f5dc1056fb5a4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D1015731C0262DDBCF00ABE5DC59BEDBB78BF0A321F000546E992B2281CB709551ABA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F31114
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31120
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F3112F
                                                                                                                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31136
                                                                                                                                                                                                                                                                                                                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F3114D
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 842720411-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 84efdd03a9ebf519c9472990720fe812173e5f342777285e3490c38d417016c7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c8668d882db58eb71805bd24d05f66f4eec7898d679c2c7b8043f20100b1f969
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 84efdd03a9ebf519c9472990720fe812173e5f342777285e3490c38d417016c7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8C011D75600209BFDB115F65DC49AAA3B6EFF85370B114415FA95D7360DA71DC00AAA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F30FCA
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F30FD6
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F30FE5
                                                                                                                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F30FEC
                                                                                                                                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F31002
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 44706859-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6c2d3af0999251e010d25cf5962fbba6b497d2ba73c896b3541776c78de50d50
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b27fb2d2fff1c0987c5b9128de57c234bb0b476f9ee627bb916e289c9869d7d6
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6c2d3af0999251e010d25cf5962fbba6b497d2ba73c896b3541776c78de50d50
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CEF04975600309BBDB214FA59C49F663BADFF8A762F104414FAD9D6251CAB1DC40AAA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F3102A
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F31036
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F31045
                                                                                                                                                                                                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F3104C
                                                                                                                                                                                                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F31062
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 44706859-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f505db8e4fa14ff44d7f2fcb9c6962d9697b6fa9c33d64707f8b5497684fd9d3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0a0461aca7b3fbfb535ca7a860fd53d42d266fed3f4bbf14381aca1764e520c7
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f505db8e4fa14ff44d7f2fcb9c6962d9697b6fa9c33d64707f8b5497684fd9d3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 67F06D75200309FBDB215FA5EC59F663BADFF8A771F100414FAD9D7251CAB1D840AAA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F40324
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F40331
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F4033E
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F4034B
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F40358
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F40365
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2962429428-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a7b740262cfbd3b3d1b8bbc60b5dcaba4f2b1e9cdc447d375e988682e590da09
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c921a9501c774f8bbea7a3c6ebf5bd1cbd34d26dabeebd8627e365fc487852c0
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a7b740262cfbd3b3d1b8bbc60b5dcaba4f2b1e9cdc447d375e988682e590da09
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4B01A272800B159FD7309F66D890422FBF5BF503253158A3FD29652931C7B1A954EF80
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D752
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D764
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D776
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D788
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0D79A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b31ddb5fd3ca13e2131f3386700a4e0f8d2fc59d7103add2c959ebc88d99c56a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d271168171120ace1f891cf969711c30561209c59c63018195638c5c8b583f17
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b31ddb5fd3ca13e2131f3386700a4e0f8d2fc59d7103add2c959ebc88d99c56a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3F01232944208ABC665EBADFDC5C167BEDBB447207E40806F048E7581C734FC80B6B4
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00F35C58
                                                                                                                                                                                                                                                                                                                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F35C6F
                                                                                                                                                                                                                                                                                                                                                      • MessageBeep.USER32(00000000), ref: 00F35C87
                                                                                                                                                                                                                                                                                                                                                      • KillTimer.USER32(?,0000040A), ref: 00F35CA3
                                                                                                                                                                                                                                                                                                                                                      • EndDialog.USER32(?,00000001), ref: 00F35CBD
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3741023627-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 45ee75563f9c04437155c5c270b1bb4624aafb4f391c7f4c069b29d9bf967c42
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d1b457d5c0639bf708f27b9f68d113cc80469c6c57eea428977168a004a9451a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 45ee75563f9c04437155c5c270b1bb4624aafb4f391c7f4c069b29d9bf967c42
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A401D630500B08ABEB205B20DD4EFA677B8FB00F59F00115AE1D3A14E0DBF1A984EA90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F022BE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F022D0
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F022E3
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F022F4
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F02305
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d51ae1162c5df162b3fd8ed4891360da54494411d03768e8c6bde801fc91edd0
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 27302a197005ae603480d13295af77566918577ba91f133bb5a85979d85119a1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d51ae1162c5df162b3fd8ed4891360da54494411d03768e8c6bde801fc91edd0
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6DF03AB48101288FCA52BF58BC059493BA4F75A760B91050BF410E32F1CB344811BBF4
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • EndPath.GDI32(?), ref: 00EE95D4
                                                                                                                                                                                                                                                                                                                                                      • StrokeAndFillPath.GDI32(?,?,00F271F7,00000000,?,?,?), ref: 00EE95F0
                                                                                                                                                                                                                                                                                                                                                      • SelectObject.GDI32(?,00000000), ref: 00EE9603
                                                                                                                                                                                                                                                                                                                                                      • DeleteObject.GDI32 ref: 00EE9616
                                                                                                                                                                                                                                                                                                                                                      • StrokePath.GDI32(?), ref: 00EE9631
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2625713937-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: bbacf0786b6e94586c82a5fd221aee790d2f29cd4a14cb2704e82d5a334ca868
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5a49c492e8fb3781c0442c67d8400ac4ac235834e1c50d65a785e74b028201d5
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bbacf0786b6e94586c82a5fd221aee790d2f29cd4a14cb2704e82d5a334ca868
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 41F0877000624CEBCB225F2AED1CBB63BA0BB0A366F008215F4B5A50F1C7708995EF60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: __freea$_free
                                                                                                                                                                                                                                                                                                                                                      • String ID: a/p$am/pm
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 364dba271ddc865a8e9ca4d9f7c90abe1aeb0aa4a0710e78510f4119e06e5034
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0faff6c551cc19507cf3301cdc6e0836a77b8369e3f2b479b304d6a0e13d93ac
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 364dba271ddc865a8e9ca4d9f7c90abe1aeb0aa4a0710e78510f4119e06e5034
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BAD11432E00206DADB289F68C895BFEB7B5FF05320F284159E941AB6D0D3759D80FB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF0242: EnterCriticalSection.KERNEL32(00FA070C,00FA1884,?,?,00EE198B,00FA2518,?,?,?,00ED12F9,00000000), ref: 00EF024D
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF0242: LeaveCriticalSection.KERNEL32(00FA070C,?,00EE198B,00FA2518,?,?,?,00ED12F9,00000000), ref: 00EF028A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF00A3: __onexit.LIBCMT ref: 00EF00A9
                                                                                                                                                                                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00F57BFB
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF01F8: EnterCriticalSection.KERNEL32(00FA070C,?,?,00EE8747,00FA2514), ref: 00EF0202
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF01F8: LeaveCriticalSection.KERNEL32(00FA070C,?,00EE8747,00FA2514), ref: 00EF0235
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: 5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 535116098-3733170431
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 48aed98eb708cac4b269a873e181e3bbcfe550977dc51bbe4f6c44c0305eb13f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9364032f943da570bcb040b09c42bf3ed38340bbc01d5d5271ff304d3883af44
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 48aed98eb708cac4b269a873e181e3bbcfe550977dc51bbe4f6c44c0305eb13f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3919970A04209AFCB04EF54E8959BDB7B1FF49311F148059FE06AB292DB31AE49EB51
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID: JO
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-1663374661
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 4996a497921dc3bef1af490a91f6f6028fabeb8bab3d59e44f69554e6b410651
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6aa7254ad2d24a8a183b16c42d80a18d19ed664b2e1ed3a192e461e1f06b519e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4996a497921dc3bef1af490a91f6f6028fabeb8bab3d59e44f69554e6b410651
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7F51BEB1E006099FEB219FB4C845BBFBBB8AF45B20F14405AF405A72E1D6B59901FF61
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00F08B6E
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00F08B7A
                                                                                                                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00F08B81
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                                                                                                                                                                                                                                                                                                      • String ID: .
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2434981716-3963672497
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 78d90aa5cbf36cb1da0b577ad4241a827d6aa0c427db8a153bb4dff4d11bdde6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 3235d9564bd05f3ae5dee89cb868f8da378b80843707a8f7d8aafa58655a3aee
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 78d90aa5cbf36cb1da0b577ad4241a827d6aa0c427db8a153bb4dff4d11bdde6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E3417BF1A04159AFDB249F24CC80A797FA6DFC6390F2881A9F4C597692DE318C03B790
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F321D0,?,?,00000034,00000800,?,00000034), ref: 00F3B42D
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F32760
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F321FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00F3B3F8
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00F3B355
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F32194,00000034,?,?,00001004,00000000,00000000), ref: 00F3B365
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F32194,00000034,?,?,00001004,00000000,00000000), ref: 00F3B37B
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F327CD
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F3281A
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                                                                                                                                      • String ID: @
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3fe30c7df815f6941af91f3db5db4b647d5c6c10998a7d68bb124f114badf884
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f7e9378caa742e54a48f9a01b3210fe10fcb420b8736a14e063d6f7049dbb595
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3fe30c7df815f6941af91f3db5db4b647d5c6c10998a7d68bb124f114badf884
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CB413972900218BFDB10DFA4CD95AEEBBB8EF09710F104099FA95B7181DB716E45DBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00F01769
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F01834
                                                                                                                                                                                                                                                                                                                                                      • _free.LIBCMT ref: 00F0183E
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free$FileModuleName
                                                                                                                                                                                                                                                                                                                                                      • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2506810119-1957095476
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 188e93b5526dc79b2d56bf5d7ec97337b8b96ac3b4920169b4bd076acda8d290
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b96e24d3b5242b07a549ec0fd2694671486083ed916e6f25dcdbe627224eedd8
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 188e93b5526dc79b2d56bf5d7ec97337b8b96ac3b4920169b4bd076acda8d290
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A314F75E40218EBDB21DF999C85E9EBBFCFB85360F144166F50497291D6708E40FBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F3C306
                                                                                                                                                                                                                                                                                                                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00F3C34C
                                                                                                                                                                                                                                                                                                                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00FA1990,00FF5600), ref: 00F3C395
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c764c664c3dbe82a7f7316a5786499ac076597ea3ec636fb5d8638ab47115157
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 236da25ec2eaad0823e019c3a9b6fdda276fba457f0afa4d1594e16380444ead
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c764c664c3dbe82a7f7316a5786499ac076597ea3ec636fb5d8638ab47115157
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 02418E726043019FD720DF25DC84B6ABBE4EF85330F148A1EF9A5A7291D774E904EB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00F6CC08,00000000,?,?,?,?), ref: 00F644AA
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32 ref: 00F644C7
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F644D7
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Long
                                                                                                                                                                                                                                                                                                                                                      • String ID: SysTreeView32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 51ddb404c6b0e38af45f17c5539c71651fd2d2c987a16e2b90bd7f71fc5eba80
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 20e1bef4c8dd1355e761947ac78f189387ba6b854f30d93ecc88b456b38a41fd
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 51ddb404c6b0e38af45f17c5539c71651fd2d2c987a16e2b90bd7f71fc5eba80
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BD31B031610209AFDF21AE38DC46BEA7BA9EB09334F244315F975A31D1DB70EC51AB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F5335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00F53077,?,?), ref: 00F53378
                                                                                                                                                                                                                                                                                                                                                      • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F5307A
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F5309B
                                                                                                                                                                                                                                                                                                                                                      • htons.WSOCK32(00000000,?,?,00000000), ref: 00F53106
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                                                                                                                                      • String ID: 255.255.255.255
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: eb700ab867491b09eb047365a4c506948f56da77fa839b6e34b7f44b0f6c378b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: fb66b09c8d748b104fc79a38832f076b92487c09bde2329b0c3c9f9a405eb2b0
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eb700ab867491b09eb047365a4c506948f56da77fa839b6e34b7f44b0f6c378b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8C31B436A042059FC710CF2CC485A6A77E0EF54369F248059EA158B392D771DE49E760
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00F63F40
                                                                                                                                                                                                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00F63F54
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F63F78
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$Window
                                                                                                                                                                                                                                                                                                                                                      • String ID: SysMonthCal32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 44a7db8af1fa964d6f7e3f27ab200981c0ad97c784b0a850d0ae371391a14fba
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: faf7e81cf6be6fffb4a0df5d9998fe2658e37a406b1fb89ca1e92268279c54c3
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 44a7db8af1fa964d6f7e3f27ab200981c0ad97c784b0a850d0ae371391a14fba
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9321D132A00219BFDF259F50CC46FEA3BB9EF48724F110214FA556B1D0D6B6AC50EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00F64705
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00F64713
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F6471A
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: msctls_updown32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a155ba941ca4b0720ce9c615ee9b165989057eb428393b6aa329c7c4c3abbf98
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0cf4b129653f79541fdef176dc9435b566d79643f73929d8135b68f9f05c60b6
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a155ba941ca4b0720ce9c615ee9b165989057eb428393b6aa329c7c4c3abbf98
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1A215EB5600209AFEB10EF64DC91DB737ADEB5A3A4B140059FA109B261CB71FC51EA60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 176396367-2734436370
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a5b8b331a28e44e086009be02aef357f82b24f9c6dc25f4f14bcdf46b0e216b2
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: cc64befd0d9e64455cc3065337bf7101544972d00a176b8d1416151dc9a9a2e8
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a5b8b331a28e44e086009be02aef357f82b24f9c6dc25f4f14bcdf46b0e216b2
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C1215B7260961166C331AB24DC03FB773D8DF91330F544026F95AA7181EBD1ED85E2A5
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00F63840
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00F63850
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00F63876
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: Listbox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7fc049697bb6234174a8540ed459789052a572b6efa83c86bfbc8a9af5ae9619
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b2b0c70c5a8d3f882a3ec13e0e17e735380cf8533edfefa96c1b861da5fd534a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7fc049697bb6234174a8540ed459789052a572b6efa83c86bfbc8a9af5ae9619
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0121C272A14218BBEF219F64CC41FFB376EEF89760F118114F9549B190C6B5DC52A7A0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00F44A08
                                                                                                                                                                                                                                                                                                                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00F44A5C
                                                                                                                                                                                                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,?,?,00F6CC08), ref: 00F44AD0
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                                                                                                                                      • String ID: %lu
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 95dd04694e7b9f80abcea86c082543d4a453669fe2d0c947f0c4b44c1b1f81bc
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e1c2093bbf18cd0b5cceb5d2e766a71a4797697c42e35533630a6606ae9f82fb
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 95dd04694e7b9f80abcea86c082543d4a453669fe2d0c947f0c4b44c1b1f81bc
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AD31A571A00108AFDB10DF54C885EAA7BF8EF04308F144095F945EB352DB75ED46DBA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00F6424F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00F64264
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00F64271
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                      • String ID: msctls_trackbar32
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f6b984332b754dbe30149b668aaca3316ff278716418269edecb82d56327b93b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a709cb87ded78dd46a6c2c5e6d1541a5c2801517207e73bd26870628675ba511
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f6b984332b754dbe30149b668aaca3316ff278716418269edecb82d56327b93b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3B110631640208BEEF206F28CC46FAB3BACEF85B64F110114FA55E2090D2B1EC51AB14
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F32DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F32DC5
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F32DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F32DD6
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F32DA7: GetCurrentThreadId.KERNEL32 ref: 00F32DDD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F32DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F32DE4
                                                                                                                                                                                                                                                                                                                                                      • GetFocus.USER32 ref: 00F32F78
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F32DEE: GetParent.USER32(00000000), ref: 00F32DF9
                                                                                                                                                                                                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00F32FC3
                                                                                                                                                                                                                                                                                                                                                      • EnumChildWindows.USER32(?,00F3303B), ref: 00F32FEB
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: %s%d
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a77c8ed2eedee6d9c287d173406ab5fb361413f875210495ee7022050f6f0d62
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d65d4b3e80add4dc086f7278713f798de72203d2ff8d27e551a6445f4e6fd37a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a77c8ed2eedee6d9c287d173406ab5fb361413f875210495ee7022050f6f0d62
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7B11E4B16002096BCF44BF70CC85EFD37AAEF84328F044076F909AB252DE759905AB70
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F658C1
                                                                                                                                                                                                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F658EE
                                                                                                                                                                                                                                                                                                                                                      • DrawMenuBar.USER32(?), ref: 00F658FD
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                                                                                                                                      • String ID: 0
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f29df87128e308656cd2c1ae21e102951663447418b979c6e343e20ad6395502
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8b6123fb96051a5560d028b6b3fcf54c30aac2bc564031782a99f8b569f68c1c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f29df87128e308656cd2c1ae21e102951663447418b979c6e343e20ad6395502
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B0016D32500258EFDB219F11DC44BAEBBB4FB45760F148099E889E6161DB709A84EF71
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00F2D3BF
                                                                                                                                                                                                                                                                                                                                                      • FreeLibrary.KERNEL32 ref: 00F2D3E5
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                                                                                                                                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3013587201-2590602151
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c0a612ef2cd7a8c0ed98b32438e48860cbd89131db4c3808d94e95b1bb591760
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a5b8be9d8a9e9595c2e776bdaa97a2580738f12d0238c4fae080ff03dd924be9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c0a612ef2cd7a8c0ed98b32438e48860cbd89131db4c3808d94e95b1bb591760
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 63F0AB32C06B79CBDB3152109C04BB93310AF12B24F698255F8D1F60C6D760CC40B2D2
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: eeb4df76fe7cf24666e2adca57bcde4faa175fd304abe40900b804ee6dac075b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 83607331651af34ddc43aa45bdea48000cad540dcb4d78f2b0d0310d12caf3e3
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eeb4df76fe7cf24666e2adca57bcde4faa175fd304abe40900b804ee6dac075b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 96C14A75A0020AEFDB14CF94C8A4BAEB7B5FF48724F108599E505EB251DB31DD41DB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1998397398-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: fe886f9ec11def1d41d87af9e7627049b19cc39d06d7aa2c8bb414d8d3aa059f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f353d9608745b38abbba5183fd1ba41fdbb1eecd78d899125026864d40c79780
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fe886f9ec11def1d41d87af9e7627049b19cc39d06d7aa2c8bb414d8d3aa059f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6CA13C756042019FC710DF28C485A2AB7E5FF88765F04895DFD89AB362DB30ED05DB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00F6FC08,?), ref: 00F305F0
                                                                                                                                                                                                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00F6FC08,?), ref: 00F30608
                                                                                                                                                                                                                                                                                                                                                      • CLSIDFromProgID.OLE32(?,?,00000000,00F6CC40,000000FF,?,00000000,00000800,00000000,?,00F6FC08,?), ref: 00F3062D
                                                                                                                                                                                                                                                                                                                                                      • _memcmp.LIBVCRUNTIME ref: 00F3064E
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 314563124-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 625a86e538e6dd9b9e84cebf1b1ca4e1447c45c737d00844876e8bcf02be4c5c
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a34429301b79f20d51985ae25d63fb009012de91575494630968a40cf917e7e6
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 625a86e538e6dd9b9e84cebf1b1ca4e1447c45c737d00844876e8bcf02be4c5c
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 72814971A00109EFCB04DF94C994EEEB7B9FF89325F204199F506AB250DB71AE06DB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00F5A6AC
                                                                                                                                                                                                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00F5A6BA
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00F5A79C
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00F5A7AB
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EECE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00F13303,?), ref: 00EECE8A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1991900642-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 0b88ac143e2f0054fd3f12902be562892592f5c827a1d4ef6a12e8a67945b49a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f29f70bcc802036fa13ebbd92d43b55186f56b6ed013b806deb453a2fd620d6e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0b88ac143e2f0054fd3f12902be562892592f5c827a1d4ef6a12e8a67945b49a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D5517E715083009FD310EF24D886A6BBBE8FF89754F00591EF995A73A2EB70D905CB92
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _free
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5965ff45cdcc59869cd37bc239d17d2697ba0b5e95995c3e2f058cef70ba3aee
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 55579390c4a7eddfd70dcd80225ebe7ad4c179f5f3714fa5c4443b5e726b18e2
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5965ff45cdcc59869cd37bc239d17d2697ba0b5e95995c3e2f058cef70ba3aee
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A1413C31A001046BEB25EFF99C456FE3AE5FF42B70F144225F619D61E2E67448817261
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F662E2
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F66315
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00F66382
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3880355969-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8ab223cf92d189da12a3c8b6b960fbc389069203ff740c0a48285ca1eaa056ee
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 27e1d34969f8c7a9b32b9b5176fa3048c1b7f5b3ac218404330d1e0be089ab4c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8ab223cf92d189da12a3c8b6b960fbc389069203ff740c0a48285ca1eaa056ee
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 87511A74A00209AFDF10DF68D8819AE7BB5FB45364F10826AF865DB390D730AD81EB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00F51AFD
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F51B0B
                                                                                                                                                                                                                                                                                                                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F51B8A
                                                                                                                                                                                                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00F51B94
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorLast$socket
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1881357543-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 08e7ec120909e92120dd95d8b8e692f3e1a2e01f17638ec746f2d934e25fd263
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c3ffce09a7efde085f07059e4f68128cdfa73d0b70a3932be6756b2514ea7de9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 08e7ec120909e92120dd95d8b8e692f3e1a2e01f17638ec746f2d934e25fd263
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D941C6346002006FD720AF24C886F2577E5EB84718F549449FA559F3D3D772ED42CB90
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c77036411ffc81d9af677faf6efc7d494bb7c6843010f150263c173b47c41cfa
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6532b74804febcfb170ce0a3526d662562d68a2ac7496fc22b79756c8f41e581
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c77036411ffc81d9af677faf6efc7d494bb7c6843010f150263c173b47c41cfa
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 72412B76A00304AFD724DF78CC41BAABBE9EF88720F10466AF541DB2D1D3759A41A790
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00F45783
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 00F457A9
                                                                                                                                                                                                                                                                                                                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00F457CE
                                                                                                                                                                                                                                                                                                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00F457FA
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3321077145-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 29ccab4c9ec5feb4980bc77bdff58a9e4838534bcc7af37880cb23665538d2cd
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 880a16e7d23d69143c1b48fe06319757000fde13ad256c9d1c1dd3a36b4e2927
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 29ccab4c9ec5feb4980bc77bdff58a9e4838534bcc7af37880cb23665538d2cd
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3C414E35600611DFCB11EF15C444A5EBBF2EF89720B198489EC8AAB3A2DB34FD01DB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00EF82D9,?,00EF82D9,?,00000001,?,?,00000001,00EF82D9,00EF82D9), ref: 00F0D910
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F0D999
                                                                                                                                                                                                                                                                                                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00F0D9AB
                                                                                                                                                                                                                                                                                                                                                      • __freea.LIBCMT ref: 00F0D9B4
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F03820: RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2652629310-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1b8ea2ab95a27dc6744cecb3556cc6714702540cbdabf8135bff738f301807e5
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 127c2aa172626f32ecd4811521fcfc8883a4e89c4a036d2845b038b4c5c7e540
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1b8ea2ab95a27dc6744cecb3556cc6714702540cbdabf8135bff738f301807e5
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8631CF72A0120AABDF24DFA4DC41EBE7BA5EB41720F054168FC14D7290EB35CD50EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00F65352
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F65375
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F65382
                                                                                                                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F653A8
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3340791633-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: c0759b303eb78fee9d966e085c4a55db8b7bd22df617b6b0dbbadfef24344a3d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 2f6e2ea3937998085d28b217602280020e8da6cba3eafa2d733b143e0c62510a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c0759b303eb78fee9d966e085c4a55db8b7bd22df617b6b0dbbadfef24344a3d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7331B235E55A0CAFEB309E54CC17BE93767AB05FA0F584102FA51A63E1C7B19940BB41
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00F3ABF1
                                                                                                                                                                                                                                                                                                                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F3AC0D
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F3AC74
                                                                                                                                                                                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00F3ACC6
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 432972143-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6f36e699a7e97e8f7b1797c02ed17e419f024c23406ddfe32cc6bb2b43c9cbee
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 7519de0f15c5aadfdf3754af8afdf3dc18b3cf3c3114fc98275df964f95b19b5
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6f36e699a7e97e8f7b1797c02ed17e419f024c23406ddfe32cc6bb2b43c9cbee
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B2311631E04618AFEB258B66CC087FE7BA5AB45370F08621AE4D5521D1C3B9CD81A792
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 00F6769A
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F67710
                                                                                                                                                                                                                                                                                                                                                      • PtInRect.USER32(?,?,00F68B89), ref: 00F67720
                                                                                                                                                                                                                                                                                                                                                      • MessageBeep.USER32(00000000), ref: 00F6778C
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1352109105-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 591907b7fa9b080304c9a6ce455cffaa00d5e7314641c00fb8057650e4181bca
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9572cc73d35879157d37b2f61e2599cd3a67e253bdb1ba22c34d59c94ccac70b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 591907b7fa9b080304c9a6ce455cffaa00d5e7314641c00fb8057650e4181bca
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4C41AE74A05318DFDB01EF58C894EA9BBF4FF49318F1980A8E4549B261D731E941EF90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00F616EB
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F33A57
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: GetCurrentThreadId.KERNEL32 ref: 00F33A5E
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F325B3), ref: 00F33A65
                                                                                                                                                                                                                                                                                                                                                      • GetCaretPos.USER32(?), ref: 00F616FF
                                                                                                                                                                                                                                                                                                                                                      • ClientToScreen.USER32(00000000,?), ref: 00F6174C
                                                                                                                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00F61752
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2759813231-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5b4e1605f73033b24b88e4e0355e6a54051fa5f7ee13e9e9416359c7bfe16b2d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8a4879d2c02a12d349b2488ceb852476078c6d98fa00bc7a77487bdb89c9d901
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5b4e1605f73033b24b88e4e0355e6a54051fa5f7ee13e9e9416359c7bfe16b2d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 80314175D00149AFCB00DFA9C881CAEBBF9FF48314B5480AAE455E7311E7359E45DBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F3DFCB
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F3DFE2
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F3E00D
                                                                                                                                                                                                                                                                                                                                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00F3E018
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3763101759-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ca6d11e1100d788601707cdbf3f10de9ec5944325fd84dfe39f2ead345a27679
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 79b5562b2efd914bef37c5017cab3219d99e316f01f8b6814bc94b25029af30c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ca6d11e1100d788601707cdbf3f10de9ec5944325fd84dfe39f2ead345a27679
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7A2183B1D00218EFCB109FA8D981B7EBBF8EF85760F144065E905BB285D6B09E419BA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F69001
                                                                                                                                                                                                                                                                                                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F27711,?,?,?,?,?), ref: 00F69016
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F6905E
                                                                                                                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F27711,?,?,?), ref: 00F69094
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2864067406-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 681eae63e107b23aac96ca783912ed597626e5ff35764e578e007fa4b0608b33
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9de0182905097d6c07944be93588aaf888712c29bdda171b0f10073b039f6054
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 681eae63e107b23aac96ca783912ed597626e5ff35764e578e007fa4b0608b33
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B5218D35A05018BFDF258FA4CC58EFA7BB9FB8A360F144059F9455B261C3B19D50EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,00F6CB68), ref: 00F3D2FB
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F3D30A
                                                                                                                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F3D319
                                                                                                                                                                                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00F6CB68), ref: 00F3D376
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2267087916-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: f7bbabea9ed49a33cae4feca6eaa5fbae0c59ca194f2441a601d2bcb1f690aa8
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d19d7f0f28f4eafb17b2b69428e3e4e08c6cb7f884d8aee34083ca7861092254
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f7bbabea9ed49a33cae4feca6eaa5fbae0c59ca194f2441a601d2bcb1f690aa8
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EF21A170909201DF8300DF28E88196A77E4EE56778F104A1EF4E9D72A1D731DD4AEB93
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F3102A
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F31036
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F31045
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F3104C
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F31062
                                                                                                                                                                                                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00F315BE
                                                                                                                                                                                                                                                                                                                                                      • _memcmp.LIBVCRUNTIME ref: 00F315E1
                                                                                                                                                                                                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F31617
                                                                                                                                                                                                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00F3161E
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1592001646-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 628f586d9b7bf64c0819d2b18ad7fc94a3131ad687ec71891962ca55e89181d5
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: ebd022b60999c038c9023e7c8d7846bf924b24be48a1f53f6e86601fa8250c80
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 628f586d9b7bf64c0819d2b18ad7fc94a3131ad687ec71891962ca55e89181d5
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E21AC71E00109EFEF10DFA5C945BEEB7B8FF44364F098469E451AB241E770AA05EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00F6280A
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F62824
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F62832
                                                                                                                                                                                                                                                                                                                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00F62840
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2169480361-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1338c9346d10490f78dd36443f5a0c4309b7c9b77fdb3b89888eda4b48469a70
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 016c3b0784d3a3a4ab5b8cd5263cf5059f942e131c3fe5ad76d1ef1536b96e27
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1338c9346d10490f78dd36443f5a0c4309b7c9b77fdb3b89888eda4b48469a70
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 51212F31304911AFD7109B24CC40FAA7B99EF85324F188209F4668B2E2CBB5FC82DBD0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F38D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00F3790A,?,000000FF,?,00F38754,00000000,?,0000001C,?,?), ref: 00F38D8C
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F38D7D: lstrcpyW.KERNEL32(00000000,?,?,00F3790A,?,000000FF,?,00F38754,00000000,?,0000001C,?,?,00000000), ref: 00F38DB2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F38D7D: lstrcmpiW.KERNEL32(00000000,?,00F3790A,?,000000FF,?,00F38754,00000000,?,0000001C,?,?), ref: 00F38DE3
                                                                                                                                                                                                                                                                                                                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00F38754,00000000,?,0000001C,?,?,00000000), ref: 00F37923
                                                                                                                                                                                                                                                                                                                                                      • lstrcpyW.KERNEL32(00000000,?,?,00F38754,00000000,?,0000001C,?,?,00000000), ref: 00F37949
                                                                                                                                                                                                                                                                                                                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00F38754,00000000,?,0000001C,?,?,00000000), ref: 00F37984
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                                                                                                                                      • String ID: cdecl
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: bd1625e25724bd57787c98f940f0566db88b5ede1fa12a3648fce0e622e926ba
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c24e5010a25305de82bc63d548ba7a39293282a77bf0287d821b274049c889db
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bd1625e25724bd57787c98f940f0566db88b5ede1fa12a3648fce0e622e926ba
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9511067A201345ABCB256F35CC45E7A77A5FF853B0F00412AF842C7264EB71D801E791
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F67D0B
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00F67D2A
                                                                                                                                                                                                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00F67D42
                                                                                                                                                                                                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00F4B7AD,00000000), ref: 00F67D6B
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$Long
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 847901565-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3173240902ab515836262bfc9ab41bfb0937e44dfe1825a633df67e6f0024962
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e4415f5f91a3d57773f480b8a5198c3a52065d77b72cc0f3ecbf053a99a56c59
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3173240902ab515836262bfc9ab41bfb0937e44dfe1825a633df67e6f0024962
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D7115E72605619AFCB10AF28CC04A7A3BA5BF46374F154B24F879D72F0E7319951EB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 00F656BB
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F656CD
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F656D8
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F65816
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 455545452-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 20df5a6043854493ee1367fb7f9684b287125c50ca228cffe647b165459b7f4b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e0628a10ca14a27cc72d682989c7b5ed653b24c3c020e77d0f77fe27d87e4b88
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 20df5a6043854493ee1367fb7f9684b287125c50ca228cffe647b165459b7f4b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9811B471A0060996DF20DF61CC85AFE77ACAF11B74F10406AF955F6082EBB4C980EB60
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7e1733308cb98dccb1097e54311d42e7c2e51a41fa6264ed5af040661280dfb2
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: cb2ca0020625855aa54121ae00dca34ef3c8588bf2628669944ece719af5ba4a
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7e1733308cb98dccb1097e54311d42e7c2e51a41fa6264ed5af040661280dfb2
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9A016DB260A61A7EF62127B86CC5F67762DEF427B8F340326F531A12D2EB649C047170
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00F31A47
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F31A59
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F31A6F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F31A8A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b674bbe112543d6a98bded205fe269ae10c5333b117567075236b4a0f8a97117
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e2b4bd7eb29eeb71680376f794a5978ff65cbe2d2049a7dc7a561e2e52c5c28c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b674bbe112543d6a98bded205fe269ae10c5333b117567075236b4a0f8a97117
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3D11F73AD01219FFEF119BA5CD85FADBB78FB08760F200091EA14B7290D6716E50EB94
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00F3E1FD
                                                                                                                                                                                                                                                                                                                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00F3E230
                                                                                                                                                                                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F3E246
                                                                                                                                                                                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F3E24D
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2880819207-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9af9a68270703e00d5a58aa50a7f75e3849738303e00ef83269b042cc8573212
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 9c12ddee068123b1235de68fd51e44759b034c02e608beaf3438cdaba6acc7af
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9af9a68270703e00d5a58aa50a7f75e3849738303e00ef83269b042cc8573212
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D61104B6D0425CBBDB019FA89C09AAF7FACAF46330F004215F964E32D0D2B0D900A7A0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,?,00EFCFF9,00000000,00000004,00000000), ref: 00EFD218
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00EFD224
                                                                                                                                                                                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00EFD22B
                                                                                                                                                                                                                                                                                                                                                      • ResumeThread.KERNEL32(00000000), ref: 00EFD249
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 173952441-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5cc813da6cc267d7d7317af9fef0ff743aad299798f7b1d0a136a48b1c0a1910
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 02c4100922c42971865d3cc9123bcd3085f1d4edca5d29f6b3e3b8275335f002
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5cc813da6cc267d7d7317af9fef0ff743aad299798f7b1d0a136a48b1c0a1910
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B301DB3650910CBBE7115BA5DC05BBF7E9ADF82331F105215FA25B21E0CB718901D6E0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00F69F31
                                                                                                                                                                                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00F69F3B
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F69F46
                                                                                                                                                                                                                                                                                                                                                      • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00F69F7A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4127811313-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 7b599caf9adc8d1db4ee08d3d74ac2c10033b7915514af112dbd7737fba42973
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 340729d16362021aff703e63f6448f5cf63715a4ba5bc35c3dbf4ff5b865114e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7b599caf9adc8d1db4ee08d3d74ac2c10033b7915514af112dbd7737fba42973
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6E11483690411AABDB10DFA8CC499FE77BCFB05311F014455F962E3141D7B4BA81EBA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00ED604C
                                                                                                                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 00ED6060
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED606A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3970641297-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 600095cdf930954a8e57da12ba052d8b5b6f607f6ff0f31ab864e3fea1b7887d
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 2c7131fdcc20433d30bf440e69f54373c04a59fe6e2c353892bf1bf1d97f8f32
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 600095cdf930954a8e57da12ba052d8b5b6f607f6ff0f31ab864e3fea1b7887d
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2811AD7210150CBFEF225FA4CC44EEABB69FF093A8F001202FA5466210C776DC61EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00EF3B56
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00EF3AD2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EF3AA3: ___AdjustPointer.LIBCMT ref: 00EF3AED
                                                                                                                                                                                                                                                                                                                                                      • _UnwindNestedFrames.LIBCMT ref: 00EF3B6B
                                                                                                                                                                                                                                                                                                                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00EF3B7C
                                                                                                                                                                                                                                                                                                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00EF3BA4
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 737400349-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b4d89798be72d4b33f02a013059341ba02fc2df70206cf2492dfd09abd0b6504
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6501297210014DBBDF125EA5CC42EFB7BA9EF88758F045015FF4866121C732E961EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00ED13C6,00000000,00000000,?,00F0301A,00ED13C6,00000000,00000000,00000000,?,00F0328B,00000006,FlsSetValue), ref: 00F030A5
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32(?,00F0301A,00ED13C6,00000000,00000000,00000000,?,00F0328B,00000006,FlsSetValue,00F72290,FlsSetValue,00000000,00000364,?,00F02E46), ref: 00F030B1
                                                                                                                                                                                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00F0301A,00ED13C6,00000000,00000000,00000000,?,00F0328B,00000006,FlsSetValue,00F72290,FlsSetValue,00000000), ref: 00F030BF
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3177248105-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: fd6413f21e5e28f81e67b4f4ebe5524d50110014773e5f9e0a14ffc417f96451
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 150ab9e2ba5fb1a3ade936383a705ba70144b0e2a80bc5a24b7a31ba018aeed5
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fd6413f21e5e28f81e67b4f4ebe5524d50110014773e5f9e0a14ffc417f96451
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D4012B33713226ABCB314B79AC44A677B9CAF06B75B104620FD59E31C0D721D901F6E0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00F3747F
                                                                                                                                                                                                                                                                                                                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00F37497
                                                                                                                                                                                                                                                                                                                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00F374AC
                                                                                                                                                                                                                                                                                                                                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00F374CA
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1352324309-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 44a650b5da8abc976472f9f26556192b812afd6bdbb6d408396c289b2c2a6bf9
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: faa8e883a6264cb4833f4e41ad60c48161bac0d928013f9eadb272075595b72c
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 44a650b5da8abc976472f9f26556192b812afd6bdbb6d408396c289b2c2a6bf9
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AC1170B1205314DBE730DF54EC08BA27BF8EB00710F108559E5A6D6191D7B0F904EB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F3ACD3,?,00008000), ref: 00F3B0C4
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F3ACD3,?,00008000), ref: 00F3B0E9
                                                                                                                                                                                                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F3ACD3,?,00008000), ref: 00F3B0F3
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F3ACD3,?,00008000), ref: 00F3B126
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2875609808-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 19706de2f886352de7b2327d696e46cdaa0295ee699222bc2152f080bc355d38
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 257b5c98c15ae4e4bd3ebbdece64281e2ea13fb5c3be9bde4bacbb44b8ba95a9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 19706de2f886352de7b2327d696e46cdaa0295ee699222bc2152f080bc355d38
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D3116171C0151CD7CF04AFE5D9687FEBB78FF0A721F104085DA91B6285CB705550ABA1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00F67E33
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F67E4B
                                                                                                                                                                                                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00F67E6F
                                                                                                                                                                                                                                                                                                                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F67E8A
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 357397906-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 8c32cc2034335a521d353ee0c076fd688c7766d32875b950207ecaddf01df14b
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: bf3e7f9bb8b576d256036184f971cdf49ce69e4040ced0dff3dca54274a1e82e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8c32cc2034335a521d353ee0c076fd688c7766d32875b950207ecaddf01df14b
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D31163B9D0020AAFDB41DF98C8849EEBBF5FB08310F504056E965E3210D775AA54DF90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F32DC5
                                                                                                                                                                                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F32DD6
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00F32DDD
                                                                                                                                                                                                                                                                                                                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F32DE4
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2710830443-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 028e1433ca8f0dd1ce4ef2bd6182715382ac691310eb1d62053174cac744a5e2
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: bbcd079b4d947d5fc72d182bb7cc78103c58b050203f835a7b6844892c411422
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 028e1433ca8f0dd1ce4ef2bd6182715382ac691310eb1d62053174cac744a5e2
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 98E0ED725012287ADB202B63DC0DFFB7E6CEF56BB1F400115F59AD1090DAE68941E6F1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EE9693
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9639: SelectObject.GDI32(?,00000000), ref: 00EE96A2
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9639: BeginPath.GDI32(?), ref: 00EE96B9
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EE9639: SelectObject.GDI32(?,00000000), ref: 00EE96E2
                                                                                                                                                                                                                                                                                                                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00F68887
                                                                                                                                                                                                                                                                                                                                                      • LineTo.GDI32(?,?,?), ref: 00F68894
                                                                                                                                                                                                                                                                                                                                                      • EndPath.GDI32(?), ref: 00F688A4
                                                                                                                                                                                                                                                                                                                                                      • StrokePath.GDI32(?), ref: 00F688B2
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1539411459-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b4c58f663cc131c72c7b283983814669e6fa3a54b784feb29ab158075ab14b38
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 753d4d63865b75a4e8886ea8523b244814e270721e6f86cf724c672abc604f79
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b4c58f663cc131c72c7b283983814669e6fa3a54b784feb29ab158075ab14b38
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5AF05E3604125DFADB126F94AC09FDE3F69AF0A350F048100FAA1A50E2C7B55511EFE5
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000008), ref: 00EE98CC
                                                                                                                                                                                                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 00EE98D6
                                                                                                                                                                                                                                                                                                                                                      • SetBkMode.GDI32(?,00000001), ref: 00EE98E9
                                                                                                                                                                                                                                                                                                                                                      • GetStockObject.GDI32(00000005), ref: 00EE98F1
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 4037423528-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a0c773efc367da23e869f827ac0bcf9be21d7b3483bb9c9ae677e16cd1ba8eea
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6d8bb07044a81749efeb7e1776f41c10dd869281b99284ea032863f8ba85f941
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a0c773efc367da23e869f827ac0bcf9be21d7b3483bb9c9ae677e16cd1ba8eea
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 64E09B31644388AFDB216B74FC09BF93F50EB12735F048219F6FA540E5C3B14650AB51
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentThread.KERNEL32 ref: 00F31634
                                                                                                                                                                                                                                                                                                                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,00F311D9), ref: 00F3163B
                                                                                                                                                                                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00F311D9), ref: 00F31648
                                                                                                                                                                                                                                                                                                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,00F311D9), ref: 00F3164F
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3974789173-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: d8740ccb2fa93abe1a1f868fff398525e60c0f9340e8bc77f4688815a376111a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 518b0b7718cc744ca125535af8da311726bef37bb1e5db00ce5fc939bfb42b02
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d8740ccb2fa93abe1a1f868fff398525e60c0f9340e8bc77f4688815a376111a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9EE08631A01215EBD7201FE19D0EB663B7CBF447A1F144808F6D5C9080D6B44440E790
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00F2D858
                                                                                                                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00F2D862
                                                                                                                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F2D882
                                                                                                                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?), ref: 00F2D8A3
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2889604237-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 03c22deacb223a20c370d76286b4ff9f5613f86a75b58826bdd9139a7923158c
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: da55104211cc381161d9fab577246f1e694fbb893eb319a2bd8fe1644a26437f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 03c22deacb223a20c370d76286b4ff9f5613f86a75b58826bdd9139a7923158c
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E6E01AB5800209EFCB419FA0D8086BDBBF2FB08310F24A009E89AE7250C7B95901BF84
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00F2D86C
                                                                                                                                                                                                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00F2D876
                                                                                                                                                                                                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F2D882
                                                                                                                                                                                                                                                                                                                                                      • ReleaseDC.USER32(?), ref: 00F2D8A3
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2889604237-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 9fb88d8c890c4f7ae716a9a6221e71bbca227090fcba4b542ce3d95fd582ad13
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 084d957cd98397c5d132c1e9259698649e77f15d45c15c08e1c9f77a589c25fa
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9fb88d8c890c4f7ae716a9a6221e71bbca227090fcba4b542ce3d95fd582ad13
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 55E01A70800208EFCB409FA0D80866DBBF1FB08310B14A009E89AE7250C7B95901AF84
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                                                                                                                                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00F44ED4
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Connection_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: *$LPT
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: cc6f664339e8b037bfa1c42eefb7edece79de7b642304f86131c32aefc301d57
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5a92a76d425179ad8a847b77d191ce25666496fdb103bf51332357d13cf56674
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cc6f664339e8b037bfa1c42eefb7edece79de7b642304f86131c32aefc301d57
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CA915E75A002049FDB14DF58C484FA9BBF1BF44324F198099E84AAF3A2D735ED86DB91
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • __startOneArgErrorHandling.LIBCMT ref: 00EFE30D
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ErrorHandling__start
                                                                                                                                                                                                                                                                                                                                                      • String ID: pow
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 787d8ffbe580980e772599e62fa0c57ea702bccf736d4390a322700f34f18d31
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 0382366f6276bfbda20166537b1e43f6e7c81a277355f1c8cfabc8b420c890a1
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 787d8ffbe580980e772599e62fa0c57ea702bccf736d4390a322700f34f18d31
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BF516A61E0E30A96DB157B14CD053BA3BA4AB40750F3099D8E1D5923F9EB34ACD1BA46
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                                                                                                                      • String ID: #
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 0-1885708031
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1167aeb3f9231781d81172b7eef650688ff0ef38b936ff9eb05e56b50f466a81
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 6269e1c6ccf8c67db8aa7ff9e45e07418ad77a9eebce5771440c8f33da7a7d2f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1167aeb3f9231781d81172b7eef650688ff0ef38b936ff9eb05e56b50f466a81
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5C513435A0029ADFDB15DF68D4816FA7BA8EF19320F245055ECA1AB3D0D6349D42EBA0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 00EEF2A2
                                                                                                                                                                                                                                                                                                                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00EEF2BB
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                                                                                                                                      • String ID: @
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 00db846c2d67d50c026b7a32dd13faa019609ef602f74117b0ca05ce22f5d28f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 189f0884c758619b4ac76f696e34ae48bdb4d5402b45ea6657ce8eb05560d3ed
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 00db846c2d67d50c026b7a32dd13faa019609ef602f74117b0ca05ce22f5d28f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C55158715087499BD320AF10DC86BAFBBF8FB84340F91884DF1D9911A5EB70852ACB66
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00F557E0
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F557EC
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: CALLARGARRAY
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ee1de5ca8dd5f9078b694159dc85343020b421f4eee54f3c692a4d59b05c39d6
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: b75fd6a3b31cdf76b6472c7b43431231df0e78d73e4f903eb8b78198872a1d3f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ee1de5ca8dd5f9078b694159dc85343020b421f4eee54f3c692a4d59b05c39d6
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CB41F231E002099FCB04DFA8C8919BEBBF5FF59722F104029E905A7291E7319D85DB90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F4D130
                                                                                                                                                                                                                                                                                                                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00F4D13A
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: |
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e2a09c1bf739855d5df34bfac90036249b148b33314974009fb8f8be261e7d6f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: a42f90ae67bc5e80054647c7bb7958f9e2b8d7b2298a01b959c17a906d468009
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e2a09c1bf739855d5df34bfac90036249b148b33314974009fb8f8be261e7d6f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D0311875D00209ABDF15EFA4CC85AEEBFB9FF44310F10001AED15B6262E731AA46DB60
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00F63621
                                                                                                                                                                                                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00F6365C
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$DestroyMove
                                                                                                                                                                                                                                                                                                                                                      • String ID: static
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6804971138216b8911b298b0fb916a7016834a4f5d1f5fe31fb9866df4291903
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5579cedf719354853fb1ccbb0afab944e6a17038413096d8195c6b38817458bb
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6804971138216b8911b298b0fb916a7016834a4f5d1f5fe31fb9866df4291903
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7231B071500204AEDB109F68CC40EFB73A9FF88764F009619F8A5D7280DA71AD81E760
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00F6461F
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F64634
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                      • String ID: '
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 06ca63f4857d793cda7f2e9d84737e12928c222d6b0b126251c06d1f7e73afe1
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c3fef1b786fbd5a8802a01b04b4c8323fa635eb7ce5f5ff1a4b0c9d7bdf061c4
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 06ca63f4857d793cda7f2e9d84737e12928c222d6b0b126251c06d1f7e73afe1
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 20313975A0130A9FDF14DFA9C980BDABBB5FF09300F14406AE905AB381D771A941DF90
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00F6327C
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F63287
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                      • String ID: Combobox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 1f45bfb5440aea4aac08b880fbf620f666bd94c4928a8942f2c8168ad0d310c3
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 591e5e3d673b967d25895859f7ce6761a36356202061585de1a75ab67f9db4a9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1f45bfb5440aea4aac08b880fbf620f666bd94c4928a8942f2c8168ad0d310c3
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8711B2717002087FFF219E54DC90EBB37AAEB953A4F104129F92897291D6719D51A760
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00ED604C
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED600E: GetStockObject.GDI32(00000011), ref: 00ED6060
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED606A
                                                                                                                                                                                                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00F6377A
                                                                                                                                                                                                                                                                                                                                                      • GetSysColor.USER32(00000012), ref: 00F63794
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                                                                                                                                      • String ID: static
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 30a7a87b8ed49e5d92c69257272c28d4b9f6291d72bb0ecd7c0cc65a98304c11
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 5caff26a820c2c57838e4690c73a2fbbab5c62f23f1ead7a3b6801a6deb38cbf
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 30a7a87b8ed49e5d92c69257272c28d4b9f6291d72bb0ecd7c0cc65a98304c11
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BC1129B2610209AFDF10DFA8CC45AFA7BB8FB09354F004515F9A6E3250D775E851AB50
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F4CD7D
                                                                                                                                                                                                                                                                                                                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00F4CDA6
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Internet$OpenOption
                                                                                                                                                                                                                                                                                                                                                      • String ID: <local>
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ab77458902b57b001d57f39700abce466315a265194993c2cdb52d43991235c4
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 3f1abc5b13475eecb55c37723f0191d8e7a81b4cfd36b5bb9ba04dd246fbc8c9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ab77458902b57b001d57f39700abce466315a265194993c2cdb52d43991235c4
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0311A372A066367AD7684A668C45FF7BE78EF127B4F005226F96983190D6609840E6F0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetWindowTextLengthW.USER32(00000000), ref: 00F634AB
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00F634BA
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: edit
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3eb6f75a2fbae9c6582bf8769b7c927d50a70f71156421246209c17dbad30550
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 97913c2ad28c07756ab3d63577ff08ab759b5ea1021850663162cf3b28c7c234
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3eb6f75a2fbae9c6582bf8769b7c927d50a70f71156421246209c17dbad30550
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 48118F71500108ABEF218E64DC44AFB776AEF05374F504324F9A5931E4CB75DC51B750
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                      • CharUpperBuffW.USER32(?,?,?), ref: 00F36CB6
                                                                                                                                                                                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00F36CC2
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                      • String ID: STOP
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a90aa89917be69db64b2159f18390fdbabd8137b143a5cf3da1c904f321b65fa
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f16438605d1f60b1fc597288d2718b5459e2801538a61ef191bf97889375f4fc
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a90aa89917be69db64b2159f18390fdbabd8137b143a5cf3da1c904f321b65fa
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6D010432A00527AACB209FBDDC809BF73F4EA60775B105529E862E6291EA31D900E750
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F31D4C
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: dc724770bb8fdc41f9ea939748bda53a65244a973c6dd89b2ef0decc3cc7dc82
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: f9dc1818514cb1a922da7123e63a0c897b676c556b37ecbc52bf2c50d13b4323
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dc724770bb8fdc41f9ea939748bda53a65244a973c6dd89b2ef0decc3cc7dc82
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 09012835A00218AB8B08EFA0DC11DFE73A8FB47770F10051AF872673C2EA345909A760
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F31C46
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a9a6336f6f4d26dd969458772bc3c17bccbe231b6c73d306f85a97fd27747c68
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 52fe16eba1c9237cb4454cea6e70198b50993fed246cbd30c9aeebae731da666
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a9a6336f6f4d26dd969458772bc3c17bccbe231b6c73d306f85a97fd27747c68
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AA01F775B8010866DF08EBA0DD51EFF73E8EB11790F10201AB41677282EA249E08A7B1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F31CC8
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 3d63217daddb160582d0d29ecc04f4bb418e7db4cfe1c8a9226b2e5008fede8f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8bbb8936d284a67252018bc3d5e8aab8606b171a14e6d3fe2140daf42690fdff
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3d63217daddb160582d0d29ecc04f4bb418e7db4cfe1c8a9226b2e5008fede8f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AC01D675B8011867DF04EBA0DE01AFE73E8AB117A0F142016B80277282EA659F09E672
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                                                                                                                                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00F31DD3
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: e8fa0e6be12b7d5adb5b9490383763c575460753041e715de913f69f23754f50
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 02d25f0bb657355a48738458dec04417388d2232821a4e83840dece1fc4d202b
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e8fa0e6be12b7d5adb5b9490383763c575460753041e715de913f69f23754f50
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FAF0F471B4021866DB08EBA4DC52BFE73A8FF02760F041916B822772C2DA649909A260
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                      • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 176396367-3042988571
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: ac11f7f2ad6d827c1db1cf6dddd1ca9b9e01db423ecc71341e4d35365f6b856f
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 575632957d4453d70f87d8caf99a93ce1838632a3edd93a333bb5e547d634240
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ac11f7f2ad6d827c1db1cf6dddd1ca9b9e01db423ecc71341e4d35365f6b856f
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EEE02B427143215093313279BCC197F56C9CFC5761714282FFF85D22A7EAD4CD91A3A1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00F30B23
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Message
                                                                                                                                                                                                                                                                                                                                                      • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 2880d0273881b292aa50ce7289766442b6819d370c8c37dbae60659f7f37d44a
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 38bbc2275cdd1ce0cf9bb7c8691e91b57187c527f5a336008385294c524a8ccf
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2880d0273881b292aa50ce7289766442b6819d370c8c37dbae60659f7f37d44a
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E8E04F3228435C2AE31436957C03F997AC48F05F61F10542BFBD8B95D38AE2649066EA
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00EEF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00EF0D71,?,?,?,00ED100A), ref: 00EEF7CE
                                                                                                                                                                                                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00ED100A), ref: 00EF0D75
                                                                                                                                                                                                                                                                                                                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00ED100A), ref: 00EF0D84
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00EF0D7F
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                                                                                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 55579361-631824599
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: b828bb3b118cc903a76fd7136b8f7cd650d9516c85a1d6fc85fefb85cfdb9f0e
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 669d86f78487af3565a45ff5803df9d488f9a2a38766e2b2f00c4eb727760c68
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b828bb3b118cc903a76fd7136b8f7cd650d9516c85a1d6fc85fefb85cfdb9f0e
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C6E092742003558BD7309FB8E4043667BE4BF14744F00992EE9D2D6652EBF2E4489BD1
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00F4302F
                                                                                                                                                                                                                                                                                                                                                      • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00F43044
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                                                                                                                                      • String ID: aut
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 86b8dc6ad7cb6c813ecd4ee97c67efbee32b6d1a97377c1b5b21e73984d1be55
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: 8c0f6c59b27a38b6857a4976f48fb7c6253bd957186eda794774c65eed905b0e
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 86b8dc6ad7cb6c813ecd4ee97c67efbee32b6d1a97377c1b5b21e73984d1be55
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D0D05E7250032867DA20A7A4EC0EFDB3A6CDB04750F0002A2BAE5E2091DAF4D984CBD0
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: LocalTime
                                                                                                                                                                                                                                                                                                                                                      • String ID: %.3d$X64
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 5af3cd1b522b04f9935f0a248b69c4a8d8c30f2b994707090240df7f1c5a79a1
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: d5827ce1fd693e56ea64407c8a1642fd429fae12aa651896164b69818075cc7d
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5af3cd1b522b04f9935f0a248b69c4a8d8c30f2b994707090240df7f1c5a79a1
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 36D0126280822CEADB5097E0EC45AF9B3BCEB08301F608452F906A1080D624C508B762
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F6236C
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000), ref: 00F62373
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3E97B: Sleep.KERNEL32 ref: 00F3E9F3
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 06c682279bee2a31eeb99bd807de1908d1a2b332e1bb7f5a38c59682ece00442
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: fb179d2dcb390e7df1b279130ae80bcb3a1f30c7eb75029f1b4b27df5c76e651
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 06c682279bee2a31eeb99bd807de1908d1a2b332e1bb7f5a38c59682ece00442
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 07D0C9323813147AEA64B770EC0FFDA7A149B04B10F004916B696EA1D1C9E4A8019A99
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F6232C
                                                                                                                                                                                                                                                                                                                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00F6233F
                                                                                                                                                                                                                                                                                                                                                        • Part of subcall function 00F3E97B: Sleep.KERNEL32 ref: 00F3E9F3
                                                                                                                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 23a6aad272b419a98aaa1ae368bca219f26531a1725e21c2a0f7010067176bf1
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: cc724ccde0613c87c7895aba91c6faef9d2fb55962e00c25d175484d3c5fe8b9
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 23a6aad272b419a98aaa1ae368bca219f26531a1725e21c2a0f7010067176bf1
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1AD01236395314B7EA64B770EC0FFDA7A149F04B10F004916B7DAEA1D1C9F4A801DB94
                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00F0BE93
                                                                                                                                                                                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00F0BEA1
                                                                                                                                                                                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F0BEFC
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.1768488168.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768460843.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768567224.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768643383.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.1768671599.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 1717984340-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: 6b7460cd915e54e28d148c72b00877568e0b0531a7b8222acd0cb4aeda81faf7
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: c3d5af6f098458e9a9a09b72521cc757c4e8ae07045740ade7d523dd13c47b53
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6b7460cd915e54e28d148c72b00877568e0b0531a7b8222acd0cb4aeda81faf7
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CC41D635A05207AFDF218FA4CC44BBA7BA9EF42721F144169FA599B1E1DB708D01FB60

                                                                                                                                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                                                                                                                                      Execution Coverage:0.4%
                                                                                                                                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                                                                                                                      Signature Coverage:100%
                                                                                                                                                                                                                                                                                                                                                      Total number of Nodes:6
                                                                                                                                                                                                                                                                                                                                                      Total number of Limit Nodes:0
                                                                                                                                                                                                                                                                                                                                                      execution_graph 5009 211751a9272 5010 211751a92c9 NtQuerySystemInformation 5009->5010 5011 211751a7644 5009->5011 5010->5011 5006 21175182377 5007 21175182387 NtQuerySystemInformation 5006->5007 5008 21175182324 5007->5008

                                                                                                                                                                                                                                                                                                                                                      Callgraph

                                                                                                                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                      • Source File: 00000010.00000002.2977666394.0000021175180000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021175180000, based on PE: false
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_21175180000_firefox.jbxd
                                                                                                                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                                                                                                                      • API ID: InformationQuerySystem
                                                                                                                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                                                                                                                      • API String ID: 3562636166-0
                                                                                                                                                                                                                                                                                                                                                      • Opcode ID: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                                                                                                                                                                      • Instruction ID: e08af053d657bdaaa2a971f148a4ebad6a22c62fa4cf9c48c2c7d9d2b4444b2f
                                                                                                                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B8A3D331614A488BDB6DDF28DC856E9B7E5FBA5311F14422ED94BC3281DF34FA42CA81